Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2025, 21:03

General

  • Target

    2025-01-09_b72628193ea26857b62348b0a1723be4_spora.exe

  • Size

    253KB

  • MD5

    b72628193ea26857b62348b0a1723be4

  • SHA1

    93293a6505dec455dcf273219efa4209cf15ae11

  • SHA256

    1092d5c58c97f17fd19a068181fc25681e056a2af74e4fd47e08c4072d3da1c1

  • SHA512

    995a7ce6e693ba11ddb2891d00def760feccd28084378e738bd8b11433024988b3b3759af29d34d00abd83466866ac58ad1182b87817ae2fb2e3fcc6fb3f5512

  • SSDEEP

    6144:ZW9vcxCeJYXEWJ3WZL4tO2ILtwlr/2b3s:ZW9H7h0h4s28twl6b3s

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\_READ_THIS_FILE_JP09VKTK_.txt

Ransom Note
CERBER RANSOMWARE --- YOUR DOCUMENTS, PH0TOS, DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! --- The only way to decrypt your files is to receive the private key and decryption program. To receive the private key and decryption program go to any decrypted folder, inside there is the special file (*_READ_THIS_FILE_*) with complete instructions how to decrypt your files. If you cannot find any (*_READ_THIS_FILE_*) file at your PC, follow the instructions below: --- 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://hjhqmbxyinislkkt.onion/9A6D-237A-051A-05C3-B228 Note! This page is available via "Tor Browser" only. --- Also you can use temporary addresses on your personal page without using "Tor Browser". --- 1. http://hjhqmbxyinislkkt.1eeyaj.top/9A6D-237A-051A-05C3-B228 2. http://hjhqmbxyinislkkt.1eagrj.top/9A6D-237A-051A-05C3-B228 3. http://hjhqmbxyinislkkt.1a2xx3.top/9A6D-237A-051A-05C3-B228 4. http://hjhqmbxyinislkkt.1gu5um.top/9A6D-237A-051A-05C3-B228 5. http://hjhqmbxyinislkkt.1w5iy8.top/9A6D-237A-051A-05C3-B228 --- Note! These are temporary addresses! They will be available for a limited amount of time!
URLs

http://hjhqmbxyinislkkt.onion/9A6D-237A-051A-05C3-B228

http://hjhqmbxyinislkkt.1eeyaj.top/9A6D-237A-051A-05C3-B228

http://hjhqmbxyinislkkt.1eagrj.top/9A6D-237A-051A-05C3-B228

http://hjhqmbxyinislkkt.1a2xx3.top/9A6D-237A-051A-05C3-B228

http://hjhqmbxyinislkkt.1gu5um.top/9A6D-237A-051A-05C3-B228

http://hjhqmbxyinislkkt.1w5iy8.top/9A6D-237A-051A-05C3-B228

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Cerber family
  • Blocklisted process makes network request 1 IoCs
  • Contacts a large (1090) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Drops file in System32 directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-09_b72628193ea26857b62348b0a1723be4_spora.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-09_b72628193ea26857b62348b0a1723be4_spora.exe"
    1⤵
    • Drops startup file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2500
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall reset
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2896
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_READ_THIS_FILE_SMP5_.hta"
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      PID:844
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_READ_THIS_FILE_JP09VKTK_.txt
      2⤵
      • System Location Discovery: System Language Discovery
      • Opens file in notepad (likely ransom note)
      PID:3012
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im "2025-01-09_b72628193ea26857b62348b0a1723be4_spora.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2136
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 1 127.0.0.1
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2500
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2200
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\_READ_THIS_FILE_JP09VKTK_.txt

    Filesize

    1KB

    MD5

    82b25feea25ff82502686d9999f7bfa6

    SHA1

    c915af1a9d749879bc0ab027c525f8195d9a4cc0

    SHA256

    ce6a0ec764b9ba96b04376fc683318c2ddb6798b668765c7b366039d11c82ab0

    SHA512

    aa3f3fa30864be5f4397fc291c6d6b4e43544ebcaab0da03fe4f358316b3f52a284f85806dc6fa3c36da41f49c5bee6a73d74117677deed7e4f1c466fb96cd47

  • C:\Users\Admin\Desktop\_READ_THIS_FILE_SMP5_.hta

    Filesize

    74KB

    MD5

    a690b86732d9c84f45f1c3b9128110ec

    SHA1

    1740f8fea0fd666d833c0d14f00e2a95e776cfc6

    SHA256

    ef7dd8f5631fb49f5eef84d41600a9394835ee83f6888297d00ba70b92428667

    SHA512

    86f01fa44c38494dac81f1a9cebd065a54ae1cc6d79c877d29dbf33d9f32bb0c2f9e5f9698a38238c8149012653aa000f07a05b5cbc229315a6c73afe56edee2

  • C:\Users\Admin\Desktop\_READ_THIS_FILE_Z74Q_.jpeg

    Filesize

    150KB

    MD5

    0ae8e2a764d9a01b0805cb2d4f42a213

    SHA1

    ddaed0bb22550a30183974284ef793cf6ae40265

    SHA256

    5fbf58c4338e113e969a4add8fa23e2904339535a650ca64a5e253694c5169bb

    SHA512

    37d2bcf5121763566961fcb07338a83aeda3e77d35f21937e8bd2cb36e25d74606225371e5328a48cdcf2f59b086eb37887ed59a79362b51d401cf2ade4f7df8

  • memory/1752-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1752-1-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1752-3-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1752-2-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1752-4-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1752-102-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1752-106-0x0000000004660000-0x0000000004662000-memory.dmp

    Filesize

    8KB

  • memory/1752-130-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2200-107-0x0000000000270000-0x0000000000272000-memory.dmp

    Filesize

    8KB