Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21/01/2025, 08:42

General

  • Target

    e3ed211653338adaff59cb0d6161174044018a84b49fa6ee2fab9dccd1221ced.exe

  • Size

    371KB

  • MD5

    c192a273a786b569df2056914faf8327

  • SHA1

    87f24f470d678deae2cade1d3fd12255e796c091

  • SHA256

    e3ed211653338adaff59cb0d6161174044018a84b49fa6ee2fab9dccd1221ced

  • SHA512

    8e036f23c66fbd545fd03aba423a47bf422cee52204fc3a2fb2682fd00a31c2f3e6dc982d01fa30ab2f8ba0b3463a763e403b212f00fe9488b2791dd03629427

  • SSDEEP

    6144:QtttRvGxiRcePUSrcTQ+Yd6v6AlYhZ+ddp5GuZEE86Yrp0eWIxQO6kUUecBlzJbu:EttRveivPrcqd26A+hcdp5GYEE8D3WIe

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+hbvil.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://yyre45dbvn2nhbefbmh.begumvelic.at/63DD62F4A5556EFB 2. http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/63DD62F4A5556EFB 3. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/63DD62F4A5556EFB If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/63DD62F4A5556EFB 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://yyre45dbvn2nhbefbmh.begumvelic.at/63DD62F4A5556EFB http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/63DD62F4A5556EFB http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/63DD62F4A5556EFB *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/63DD62F4A5556EFB
URLs

http://yyre45dbvn2nhbefbmh.begumvelic.at/63DD62F4A5556EFB

http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/63DD62F4A5556EFB

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/63DD62F4A5556EFB

http://xlowfznrg4wf7dli.ONION/63DD62F4A5556EFB

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (280) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3ed211653338adaff59cb0d6161174044018a84b49fa6ee2fab9dccd1221ced.exe
    "C:\Users\Admin\AppData\Local\Temp\e3ed211653338adaff59cb0d6161174044018a84b49fa6ee2fab9dccd1221ced.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Local\Temp\e3ed211653338adaff59cb0d6161174044018a84b49fa6ee2fab9dccd1221ced.exe
      "C:\Users\Admin\AppData\Local\Temp\e3ed211653338adaff59cb0d6161174044018a84b49fa6ee2fab9dccd1221ced.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Windows\mcntwvenykep.exe
        C:\Windows\mcntwvenykep.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Windows\mcntwvenykep.exe
          C:\Windows\mcntwvenykep.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2316
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2176
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\E3ED21~1.EXE
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2884
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+hbvil.html

    Filesize

    9KB

    MD5

    34bbaad0e68644348f32060476292918

    SHA1

    e618d5868bb5cff3c73fbd471c3bec1b8d0aee19

    SHA256

    abd4e075930be5216e081ae52fcfcef13681e508d4f048adb22692056741086c

    SHA512

    60e469588dc845e12be4beeca7cdfe03d07bcfde9145bc70d21827ea2d8440f7500921420eca07a7251512c6f59ce4d9312f1521ca519e0e2aa3ec39873363b0

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+hbvil.png

    Filesize

    63KB

    MD5

    8ebcab2f4ce9972cbaadcee22334d1f1

    SHA1

    5a6448c992b3dbe626a8c533cd8cd5c7944edfee

    SHA256

    9028ad600c5bed2a60141b90689f702b6cae84c841d992615c25acd607aff8d5

    SHA512

    82a7fe3571e037b026ad39a53e8e3bc0af5b7818df364b0c18dd2b115b3671050982badeb9a2821daf397ba2117145a1e4a84ad3a566de3d74e4a08a37648936

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+hbvil.txt

    Filesize

    1KB

    MD5

    ed0a2fe7ea1e125e971f520dfa2cec59

    SHA1

    bbde919d358312311550a2fca2244b0c5d8da020

    SHA256

    e08dc8eb9fa83bef3d39ccc086240392d322ed2bb1f5f1df084afa8c4cdd2751

    SHA512

    1ddaa351d8e202593fde5b0589b016dc50ef7b8ffeb5f45feadc2280f43f1e4c304b74f964f7b4d3b409f04b5761e7eab31630fca57acfa5ba6302a6b0bc9472

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    ffbb51486c9bdbd24684b0ac9a2ed829

    SHA1

    4a90ad4e724429b3f95e2e71ae4584e494c7833a

    SHA256

    e31048db1d6db78725f8b84e94d6e76f0113a903aed234c24a0745eb7acba117

    SHA512

    867202b77effbb3a6b5254668d7b86d37ee1ba421f9b39fb94947dfdd885a1ae4dca6cc44bf40008ba9821f8551769be8d2de46f2b0ecdde9d52616524788855

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    c99f0faa5af200900db6c18d9c180d83

    SHA1

    d57abc303f81156d206f9b07ab9f7a2f34ac308a

    SHA256

    e63a940db35e5424ecca0b188890e4bce7fe369d2d97a422611a533c58365b28

    SHA512

    3f1d255e02422ee79b87156a437a8bf37a97b5022e2de1e3d55b482f6cccbe3a44226d3171997509fbde7c06837027119c0747abf7ac69fba29eeaf68abd53ca

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    89e8cef815ceea95bdd8d72322a5a7c5

    SHA1

    0c0546a66cc8cf3fb377ef2d0bb5e01e5cbaeb2c

    SHA256

    548b7364f126e2ba8b01dc01cf64b9958f6902ad96af8469038f101a7ab35080

    SHA512

    2d7e96a5cd3aefc20ae75ea719fe498664a488d473cc67c93a357da8e80558dee92043cab9bfaa48e73d559a846e1478b612eeb0d2f52d378bc4f91b8f0f06d4

  • C:\Windows\mcntwvenykep.exe

    Filesize

    371KB

    MD5

    c192a273a786b569df2056914faf8327

    SHA1

    87f24f470d678deae2cade1d3fd12255e796c091

    SHA256

    e3ed211653338adaff59cb0d6161174044018a84b49fa6ee2fab9dccd1221ced

    SHA512

    8e036f23c66fbd545fd03aba423a47bf422cee52204fc3a2fb2682fd00a31c2f3e6dc982d01fa30ab2f8ba0b3463a763e403b212f00fe9488b2791dd03629427

  • memory/2316-45-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2316-496-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2316-2669-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2316-1960-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2316-1168-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2316-759-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2316-286-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2316-51-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2316-46-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2316-47-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2316-49-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2432-16-0x0000000000240000-0x0000000000243000-memory.dmp

    Filesize

    12KB

  • memory/2432-0-0x0000000000240000-0x0000000000243000-memory.dmp

    Filesize

    12KB

  • memory/2716-27-0x0000000000400000-0x000000000056E000-memory.dmp

    Filesize

    1.4MB

  • memory/2912-28-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2912-17-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2912-9-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2912-15-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2912-13-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2912-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2912-3-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2912-1-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2912-5-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2912-7-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB