Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3db402b152a...69.exe
windows7-x64
10db402b152a...69.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3HelpButton.dll
windows7-x64
3HelpButton.dll
windows10-2004-x64
3General
-
Target
db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe
-
Size
261KB
-
Sample
250226-htfv6sxjv3
-
MD5
927635549829f48f929ead0fc59dcb84
-
SHA1
7c21f900ac8c3ca5311a77a591f002494ad7d85b
-
SHA256
db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669
-
SHA512
db1672765f4cdb8faa6bfd7ae993ad27e8b4f25a894d9883624aae80bd33ae2bcb3c8d91e91961f10c8f714e2507766586759362e292b4a6e6f1ade6cf485c0a
-
SSDEEP
6144:hwHysO+xpuZUVW3CHI4eHKerKFY/pavGOX3MCefFIu:KO+xpBVgeeHKerTRavfXcJfR
Static task
static1
Behavioral task
behavioral1
Sample
db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
HelpButton.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
HelpButton.dll
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.txt
http://bqyjebfh25oellur.onion.to/5861-40E7-8947-0072-C975
http://bqyjebfh25oellur.onion.cab/5861-40E7-8947-0072-C975
http://bqyjebfh25oellur.onion.nu/5861-40E7-8947-0072-C975
http://bqyjebfh25oellur.onion.link/5861-40E7-8947-0072-C975
http://bqyjebfh25oellur.tor2web.org/5861-40E7-8947-0072-C975
http://bqyjebfh25oellur.onion/5861-40E7-8947-0072-C975
Extracted
C:\Users\Admin\AppData\Roaming\# DECRYPT MY FILES #.html
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt
http://bqyjebfh25oellur.onion.to/1946-0EB0-3613-0072-CE96
http://bqyjebfh25oellur.onion.cab/1946-0EB0-3613-0072-CE96
http://bqyjebfh25oellur.onion.nu/1946-0EB0-3613-0072-CE96
http://bqyjebfh25oellur.onion.link/1946-0EB0-3613-0072-CE96
http://bqyjebfh25oellur.tor2web.org/1946-0EB0-3613-0072-CE96
http://bqyjebfh25oellur.onion/1946-0EB0-3613-0072-CE96
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html
Targets
-
-
Target
db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669.exe
-
Size
261KB
-
MD5
927635549829f48f929ead0fc59dcb84
-
SHA1
7c21f900ac8c3ca5311a77a591f002494ad7d85b
-
SHA256
db402b152ab036ca99afb8033ddcc6f227ce2f9947bd4a32e5b4a39c57fe9669
-
SHA512
db1672765f4cdb8faa6bfd7ae993ad27e8b4f25a894d9883624aae80bd33ae2bcb3c8d91e91961f10c8f714e2507766586759362e292b4a6e6f1ade6cf485c0a
-
SSDEEP
6144:hwHysO+xpuZUVW3CHI4eHKerKFY/pavGOX3MCefFIu:KO+xpBVgeeHKerTRavfXcJfR
-
Cerber family
-
Modifies visiblity of hidden/system files in Explorer
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Adds policy Run key to start application
-
Contacts a large (526) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
14KB
-
MD5
2a03c4a7ac5ee5e0e0a683949f70971b
-
SHA1
3bd9877caaea4804c0400420494ad1143179dcec
-
SHA256
d4f0042d8e7622b7e14395e926dd02edab3cdc77e82d88108b67a4d2cee9229b
-
SHA512
1942cdb522859f8dba46824786e361794a62e6201279201e1e0e2e07499fb6252933c5661782fccd77291c3650cafb2a7a08eee5431c8238f0da44840ee4c476
-
SSDEEP
192:y4n3T5aK+dHCMR1aQR9RuZl3WWmU7WYZsw1JpVGnrjdK72dwF7dBOne:Tn3T5KdHCMRD/R1cOnrjd+BO
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
6f5257c0b8c0ef4d440f4f4fce85fb1b
-
SHA1
b6ac111dfb0d1fc75ad09c56bde7830232395785
-
SHA256
b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
-
SHA512
a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
SSDEEP
96:zPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+y:zPtkuWJX7zB3kGwfy0nyUVsxCjOM61u
Score3/10 -
-
-
Target
HelpButton.dll
-
Size
76KB
-
MD5
e87d836a5094e4720b19e8124b2d76d8
-
SHA1
da920dc64ba4368036311404b2ae1893e7053a05
-
SHA256
ce32626ed09ea15d255a8f2bb01e0c7665d2b83dd3d6ebc2c5d1d18dc35b4c30
-
SHA512
99e57fedf614b061f83454349c3491006b4edafcd830de1502fcad866e5f8d3495b849851078510c65b545030869d3dcddb3784f79316770756fb52553264aa1
-
SSDEEP
1536:XlrTKv+5AwS09OhZ1/Z3064chppBNFV+YG1LggcAJlwVBtx:X5Kv+gD1/Z3V4OppvEnJly
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1