Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.7z
-
Size
894KB
-
Sample
250316-s1vysatxgv
-
MD5
d41f6613256eb0ad7422d080e25b1295
-
SHA1
1b0467ff55f311fbb2374d60167954c8afa1bf6e
-
SHA256
773a84c3fcd0056ba603a8289affadb52b3ec1162fe161d4874aa9bc30b4e8d8
-
SHA512
cc94ead6e6ae0b999082decd7ed656c25647e16b2ce09b6f604cab565aaa7ef2a12cac5b4d60e6553236fb5b53f51e8098a4282df429e0c44b1b6fc19f40a228
-
SSDEEP
12288:/ve9LHimubryf14MQQ95OJHu9DgCgAaDKIMgaeI1jgeheAIm0w39D8wT0EJ3d7a:ogumMQQ9IF3CUKeehlv0Ih8G0EJ1a
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.7z
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\Program Files\Common Files\DESIGNER\etrU_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Targets
-
-
Target
Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.7z
-
Size
894KB
-
MD5
d41f6613256eb0ad7422d080e25b1295
-
SHA1
1b0467ff55f311fbb2374d60167954c8afa1bf6e
-
SHA256
773a84c3fcd0056ba603a8289affadb52b3ec1162fe161d4874aa9bc30b4e8d8
-
SHA512
cc94ead6e6ae0b999082decd7ed656c25647e16b2ce09b6f604cab565aaa7ef2a12cac5b4d60e6553236fb5b53f51e8098a4282df429e0c44b1b6fc19f40a228
-
SSDEEP
12288:/ve9LHimubryf14MQQ95OJHu9DgCgAaDKIMgaeI1jgeheAIm0w39D8wT0EJ3d7a:ogumMQQ9IF3CUKeehlv0Ih8G0EJ1a
-
Disables service(s)
-
Hive family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies security service
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
2Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1