Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    HEUR-Trojan-Ransom.MSIL.Gen.gen-0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca.7z

  • Size

    221KB

  • Sample

    250228-srqbya1q17

  • MD5

    4295ccfda99a2c3185ed6da64e71c692

  • SHA1

    f652680c70da9db20f2ed63e81e3e8f3e8dc9f73

  • SHA256

    4bdfa0f7676d04b93a7abd26d1ca02114b7ffeab3b4aa21f003e9e605ce7425d

  • SHA512

    e1c5c2b8c8e7538c93f98a1a17deeed012e291eb8f92f1ff6c5efbc6cb446c9419b3ad493d1e4c86b9928453a3475fb8b67315fe8e574915a038ebc2d5dfeec8

  • SSDEEP

    6144:dzL0N14NF6r93BAJkqp/PIey3SxOTe6CixjsY5aFkAB:dWUF6hQkqpaeMpCixjswCkY

Malware Config

Targets

    • Target

      HEUR-Trojan-Ransom.MSIL.Gen.gen-0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca.7z

    • Size

      221KB

    • MD5

      4295ccfda99a2c3185ed6da64e71c692

    • SHA1

      f652680c70da9db20f2ed63e81e3e8f3e8dc9f73

    • SHA256

      4bdfa0f7676d04b93a7abd26d1ca02114b7ffeab3b4aa21f003e9e605ce7425d

    • SHA512

      e1c5c2b8c8e7538c93f98a1a17deeed012e291eb8f92f1ff6c5efbc6cb446c9419b3ad493d1e4c86b9928453a3475fb8b67315fe8e574915a038ebc2d5dfeec8

    • SSDEEP

      6144:dzL0N14NF6r93BAJkqp/PIey3SxOTe6CixjsY5aFkAB:dWUF6hQkqpaeMpCixjswCkY

    • Jigsaw Ransomware

      Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

    • Jigsaw family

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Renames multiple (3690) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks