Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/01/2025, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
PackedEncryptor.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PackedEncryptor.exe
Resource
win10v2004-20241007-en
General
-
Target
PackedEncryptor.exe
-
Size
485KB
-
MD5
0f30d0d58dcc450cb0b05f1f84916cbb
-
SHA1
16033c2fe6c2149b8a23f5d7e01d30cdc73687b1
-
SHA256
14b9941d53f382c49d9ab75b8ec086210c17b19ffac0d071f462c4bfa8b5157a
-
SHA512
b101e4cd57fbe9e5b1636a9bac0b70f8cd3d4151b40b0c464dc9616fd192efee7e11458ce92d847b1e9879cb6f2eec17838f8d4b437a832c24cc504628d43ea3
-
SSDEEP
12288:syveQB/fTHIGaPkKEYzURNAgbAggkFLz8qd2:suDXTIGaPhEYzUzAktFX8x
Malware Config
Extracted
C:\RlWCfyLxZ.README.txt
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000014b28-4.dat family_lockbit -
Renames multiple (321) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2636 Encryptor.exe 2580 5F11.tmp -
Loads dropped DLL 1 IoCs
pid Process 2636 Encryptor.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini Encryptor.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini Encryptor.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\RlWCfyLxZ.bmp" Encryptor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\RlWCfyLxZ.bmp" Encryptor.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2580 5F11.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F11.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Encryptor.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop Encryptor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\WallpaperStyle = "10" Encryptor.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2636 Encryptor.exe 2636 Encryptor.exe 2636 Encryptor.exe 2636 Encryptor.exe 2636 Encryptor.exe 2636 Encryptor.exe 2636 Encryptor.exe 2636 Encryptor.exe 2636 Encryptor.exe 2636 Encryptor.exe 2636 Encryptor.exe 2636 Encryptor.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeDebugPrivilege 2636 Encryptor.exe Token: 36 2636 Encryptor.exe Token: SeImpersonatePrivilege 2636 Encryptor.exe Token: SeIncBasePriorityPrivilege 2636 Encryptor.exe Token: SeIncreaseQuotaPrivilege 2636 Encryptor.exe Token: 33 2636 Encryptor.exe Token: SeManageVolumePrivilege 2636 Encryptor.exe Token: SeProfSingleProcessPrivilege 2636 Encryptor.exe Token: SeRestorePrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeSystemProfilePrivilege 2636 Encryptor.exe Token: SeTakeOwnershipPrivilege 2636 Encryptor.exe Token: SeShutdownPrivilege 2636 Encryptor.exe Token: SeDebugPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeBackupPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe Token: SeSecurityPrivilege 2636 Encryptor.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2636 2240 PackedEncryptor.exe 28 PID 2240 wrote to memory of 2636 2240 PackedEncryptor.exe 28 PID 2240 wrote to memory of 2636 2240 PackedEncryptor.exe 28 PID 2240 wrote to memory of 2636 2240 PackedEncryptor.exe 28 PID 2636 wrote to memory of 2580 2636 Encryptor.exe 31 PID 2636 wrote to memory of 2580 2636 Encryptor.exe 31 PID 2636 wrote to memory of 2580 2636 Encryptor.exe 31 PID 2636 wrote to memory of 2580 2636 Encryptor.exe 31 PID 2636 wrote to memory of 2580 2636 Encryptor.exe 31 PID 2580 wrote to memory of 2136 2580 5F11.tmp 32 PID 2580 wrote to memory of 2136 2580 5F11.tmp 32 PID 2580 wrote to memory of 2136 2580 5F11.tmp 32 PID 2580 wrote to memory of 2136 2580 5F11.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\PackedEncryptor.exe"C:\Users\Admin\AppData\Local\Temp\PackedEncryptor.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Encryptor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Encryptor.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\ProgramData\5F11.tmp"C:\ProgramData\5F11.tmp"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\5F11.tmp >> NUL4⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1481⤵PID:1832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD51b3ba40dc3decd0dd64da2f339433a75
SHA1ac42ee17cfc364bfbd5315a7e48dce05217a6aa2
SHA256af2a0d16593b390d0d3bc2d77205bcb573e0be43211b5537f6cce4a6759bf7a4
SHA512d11f90deb501e5de2833c72be52bc3ab8a9748586a1f73ae7b86d0249ed4e76e331a48ad74f6d3737fabc6be4f991d94152fa3119f28614df17789f298a59c6c
-
Filesize
1KB
MD5c283c63ae856a725b5e4f127156e4cf6
SHA1d8d9b6f436f2495f52eb248f05998835fc71738d
SHA2569bcbb2fc5d4124bce953bda76499c9a1ddf81a7befb06dd1c0294bedd3c9ba4b
SHA5123a07269c7de4a3ce862aa8f15014bab2f39497c1be0359fd34b2ecb4f417dd9cdcb43c249d7f80563d2facedaece9741310f5e8cd452e15c508e02098be9d0e2
-
Filesize
147KB
MD5d50a56bc08e03830e9050ed7aeb2863b
SHA1327a40442aa8df4b2c0ea7f5e0a0e1f8a5e33537
SHA256291028dacef2f9d9a8bc94f479ba7b945f1d28ff6cdeeb6e3340f9b4d250d980
SHA5128f9b76e71e30f67667f4f52fe87b9c64645c93cbf7251de914380012e0c61448a8485db0611972f63e8bd038449edd3e11be0a1149a539d4d10e8e18c1334547
-
Filesize
147KB
MD55e0b0af4c133567f05fe4efd9b6936e5
SHA15469f3b48217924741c024cd2f8fb8f808502654
SHA256bd66fb04d8359196cb918f81f48a662830928dfd3218dfe0cc2418e21615f5a5
SHA5129ccb59ee9688deef4fef9d329337299e126f40cc904acdea288e7b96d72a9c9546b8da2a175aeeefe7547e6167898de5df97f8a123b9189da94d86e4ffb421fa
-
Filesize
147KB
MD59fb1f67fd8bf23ff6dff0549abaafd6a
SHA1b960f2349b17bd0cad885a8316a200c4cb6716f3
SHA256db60d8b880121c4703071141a31011170332afd719f693ea1027dbc5689854f6
SHA512010488e69d3841eca9334db58e69876f80e4bcbde9449e676ac21d657bc03236c45d12020e2ec8bd03b7a806ae445bc16943a24d6afa27912a52c3208a0ebde6
-
Filesize
129B
MD5a3cb26a22dee58493464c289f46136ca
SHA1bc64842718efbf68df4a5470b6d65c599229b409
SHA256d923cfab74b0e038e357a0efc81f32d6e23ac44860fa63764f62d7391bc0e3be
SHA51246e855524813914ffc7f0682ee314653d1bf7953ad6a210c9eaac07c3c90a212365032516c39948ad13b8a4a539d5a3685544567c1bde3c795bbf610935a2424
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf