Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Desktop.zip
-
Size
770KB
-
Sample
250309-a6e6eawk17
-
MD5
45d7b26c64c4cf6380a85371a26ffb45
-
SHA1
39504aa4617d5dd2c2a790c1eb5a651577bc7770
-
SHA256
3cdad5d046d056559562601efd1f2e0eb14285303abbb43f148b76070f498534
-
SHA512
5012907355a8b0b3d9973a3c468d90860687d6af0ff3b18316f87b0efe286a5bfa2237a0ae7f23259dcd009c181fa819502b8a64a678bd0168cba710076a347c
-
SSDEEP
12288:xeE0t09aEHHFJySS4ii2biK71J0oHH/upHOcmpfq41OYDwu:xeEorQvySStuK7UoHH/quce1OYN
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Ransom.CoronaVirus.exe
Resource
win10v2004-20250217-ja
Behavioral task
behavioral2
Sample
Trojan.Ransom.CoronaVirus.exe
Resource
win7-20241010-ja
Behavioral task
behavioral3
Sample
Trojan.Ransom.Jigsaw.exe
Resource
win10v2004-20250217-ja
Behavioral task
behavioral4
Sample
Trojan.Ransom.Jigsaw.exe
Resource
win7-20250207-ja
Malware Config
Targets
-
-
Target
Trojan.Ransom.CoronaVirus.exe
-
Size
1.0MB
-
MD5
055d1462f66a350d9886542d4d79bc2b
-
SHA1
f1086d2f667d807dbb1aa362a7a809ea119f2565
-
SHA256
dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0
-
SHA512
2c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1
-
SSDEEP
24576:FRYz/ERA0eMuWfHvgPw/83JI8CorP9qY0:FE/yADMuYvgP93JIc2
Score3/10 -
-
-
Target
Trojan.Ransom.Jigsaw.exe
-
Size
283KB
-
MD5
2773e3dc59472296cb0024ba7715a64e
-
SHA1
27d99fbca067f478bb91cdbcb92f13a828b00859
-
SHA256
3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
-
SHA512
6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
SSDEEP
6144:7fukPLPvucHiQQQ4uuy9ApZbZWxcZt+kTfMLJTOAZiYSXjjeqXus:7fu5cCT7yYlWi8kTfMLJTOAZiYSXjyqX
Score10/10-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
Renames multiple (221) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-