Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
HEUR-Trojan-Ransom.MSIL.Gen.gen-0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca.7z
-
Size
221KB
-
Sample
250228-srqbya1q17
-
MD5
4295ccfda99a2c3185ed6da64e71c692
-
SHA1
f652680c70da9db20f2ed63e81e3e8f3e8dc9f73
-
SHA256
4bdfa0f7676d04b93a7abd26d1ca02114b7ffeab3b4aa21f003e9e605ce7425d
-
SHA512
e1c5c2b8c8e7538c93f98a1a17deeed012e291eb8f92f1ff6c5efbc6cb446c9419b3ad493d1e4c86b9928453a3475fb8b67315fe8e574915a038ebc2d5dfeec8
-
SSDEEP
6144:dzL0N14NF6r93BAJkqp/PIey3SxOTe6CixjsY5aFkAB:dWUF6hQkqpaeMpCixjswCkY
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan-Ransom.MSIL.Gen.gen-0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca.7z
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
HEUR-Trojan-Ransom.MSIL.Gen.gen-0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca.7z
-
Size
221KB
-
MD5
4295ccfda99a2c3185ed6da64e71c692
-
SHA1
f652680c70da9db20f2ed63e81e3e8f3e8dc9f73
-
SHA256
4bdfa0f7676d04b93a7abd26d1ca02114b7ffeab3b4aa21f003e9e605ce7425d
-
SHA512
e1c5c2b8c8e7538c93f98a1a17deeed012e291eb8f92f1ff6c5efbc6cb446c9419b3ad493d1e4c86b9928453a3475fb8b67315fe8e574915a038ebc2d5dfeec8
-
SSDEEP
6144:dzL0N14NF6r93BAJkqp/PIey3SxOTe6CixjsY5aFkAB:dWUF6hQkqpaeMpCixjswCkY
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Renames multiple (3690) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1