Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2025, 04:07

General

  • Target

    92ccdcead66a6415486a2ccb1095c0018c4debadd77b2be1978df1277985967f.exe

  • Size

    5.0MB

  • MD5

    a6302fdb63e2244c1246a73a7d65d09e

  • SHA1

    0711949aab58c1b051b388d89db388db2b047feb

  • SHA256

    92ccdcead66a6415486a2ccb1095c0018c4debadd77b2be1978df1277985967f

  • SHA512

    0628dad85e2185e25142c126667b9213c3a6611e44b8317499e52027bc3a0c6e0865a0861ec20d1381b393caba076046e85666f2b896bfa199928f57825836a3

  • SSDEEP

    49152:DMlGFv3fPoKMZYicBePW1uXq6z+69Lp3U7EW2GO7OKIbSqEQV:DtFvfPs+icB74XhJmqb7OKIbS

Malware Config

Extracted

Family

agenda

Credentials
Attributes
  • company_id

    rZZihBNaJ0

  • note

    -- Qilin Your network/system was encrypted. Encrypted files have new extension. -- Compromising and sensitive data We have downloaded compromising and sensitive data from your system/network. From:10.0.201.164#10.0.201.247#10.0.201.212#10.0.201.111 about 1T+ Our group cooperates with the mass media. If you refuse to communicate with us and we do not come to an agreement, your data will be reviewed and published on our blog and on the media page (https://31.41.244.100) if we do not receive any reply from you, we will proceed with the data release process and inform your customers that you and your company may face regulatory penalties, customer lawsuits, a collapse in reputation, and complete system failure to recover, which could have a very adverse impact on you Blog links: http://kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion Data includes: - Employees personal data, CVs, DL , SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... -- Warning 1) If you modify files - our decrypt software won't able to recover data 2) If you use third party software - you can damage/modify files (see item 1) 3) You need cipher key / our decrypt software to restore you files. 4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. -- Recovery 1) Download tor browser: https://www.torproject.org/download/ 2) Go to domain 3) Enter credentials Please note that communication with us is only possible via the website in the Tor browser, which is specified in this note. All other means of communication are not real and may be created by third parties, if such were not provided in this note or on the website specified in this note. -- Credentials Extension: rZZihBNaJ0 Domain: qxeabmomf6qymsg7sy5i26i72255zljsi7bv7asowbbw5oqwkahbkfad.onion login: WRefa9HaXdsJOob3gZdGggwf07v492FG password:

rsa_pubkey.plain

Signatures

  • Agenda Ransomware

    A ransomware with multiple variants written in Golang and Rust first seen in August 2022.

  • Agenda family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\92ccdcead66a6415486a2ccb1095c0018c4debadd77b2be1978df1277985967f.exe
    "C:\Users\Admin\AppData\Local\Temp\92ccdcead66a6415486a2ccb1095c0018c4debadd77b2be1978df1277985967f.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1460-0-0x0000000010000000-0x00000000104B6000-memory.dmp

    Filesize

    4.7MB

  • memory/1460-10-0x0000000000940000-0x0000000000E49000-memory.dmp

    Filesize

    5.0MB