Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    The Greedy Wisher (1).pdf

  • Size

    59.9MB

  • Sample

    250317-vm8c3avxc1

  • MD5

    b5081493fc50f8694b88dad028e3152c

  • SHA1

    7b7915b5ce54c41d04cb2c959f30ebb32fe100fc

  • SHA256

    42a9c7d26ee8eee58e5ee67e1c0841851cb864d7d67c78d287862c61f2fc20c0

  • SHA512

    a285056a52a8bfa370adc01354d42d21406bee89eafb05a608026dfd8d4a2cba10bbb97b40dfb0b66ab47aae05534f29136330ee107afb203d94bb520f1891cc

  • SSDEEP

    1572864:B464X4UwWeftEEL2tEEL4tEELMtEELDtEEL+:u7oUwCE7ElEBEyEK

Malware Config

Extracted

Family

azorult

C2

http://boglogov.site/index.php

Extracted

Path

F:\$RECYCLE.BIN\S-1-5-21-3920955164-3782810283-1225622749-1000\CDWQKWSOLP-MANUAL.txt

Family

gandcrab

Ransom Note
---= GANDCRAB V5.2 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .CDWQKWSOLP The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/f16c4815cf85c87 | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/f16c4815cf85c87

Extracted

Path

C:\c8f64af\DECRYPT_YOUR_FILES.HTML

Ransom Note
<html> <head> <style> body{ background-color: #3366CC; } h1 { background-color: RGB(249, 201, 16); } p { background-color: maroon; color: white; } </style> </head> <body> <center> <h1><b> Attention ! All your files </b> have been encrypted. </h1></br> <p> Due encrypting was used algoritm RSA-4096 and AES-256, used for protection military secrets.</br> That means > RESTORE YOU DATA POSIBLE ONLY BUYING decryption passwords from us.</br> Getting a decryption of your files is - SIMPLY task.</br></br> That all what you need:</br> 1. Sent Your ID_KEY on mailbox [email protected] or [email protected] </br> 2. For test, decrypt 2 small files, to be sure that we can decrypt you files.</br> 3. Pay our services. </br> 4. GET software with passwords for decrypt you files.</br> 5. Make measures to prevent this type situations again.</br></br> IMPORTANT(1)</br> Do not try restore files without our help, this is useless, and can destroy you data permanetly.</br></br> IMPORTANT(2) </br> We Cant hold you decryption passwords forever. </br>ALL DECRYPTION PASSWORDS, for what wasn`t we receive reward, will destroy after week of moment of encryption. </p> <p> Your ID_KEY: <br> </p> <table width="1024" border="0"> <tbody> <tr> <td><p>DQdNQHCOMBDOEiXSCgWOKUjLy24JtddB27nd3I1osko96iPJ/KchfQouyqm4UYDOYabvd9CEMshkUTbAFPkMwDIElpZPzN0jUj2L5YtF/m3gNN+YQHYqP29dQg61tImxnETH2aXZetxJf0A4l1QLu+P9Wn8+g+5RCqkzakgFl6iA17aD6sKjMAgdRFYlIbJg8VFAGL/M4sKlU3W9VE+U5So7EzC33LCDk1F4M/MMsdcfVqjp6W8p2Kyl1QSxxXJYVGSpcODR0RZnMt99lkCeNHB/3JV6Lpcf8brVY5DFa8ikJQTGb14hgU4OzAq6IpDfDfz1ysqJ01BFa4H9ZxNr2A==ZW4tVVM=</p></td> </tr> </tbody> </table> </center></html></body>

Targets

    • Target

      The Greedy Wisher (1).pdf

    • Size

      59.9MB

    • MD5

      b5081493fc50f8694b88dad028e3152c

    • SHA1

      7b7915b5ce54c41d04cb2c959f30ebb32fe100fc

    • SHA256

      42a9c7d26ee8eee58e5ee67e1c0841851cb864d7d67c78d287862c61f2fc20c0

    • SHA512

      a285056a52a8bfa370adc01354d42d21406bee89eafb05a608026dfd8d4a2cba10bbb97b40dfb0b66ab47aae05534f29136330ee107afb203d94bb520f1891cc

    • SSDEEP

      1572864:B464X4UwWeftEEL2tEEL4tEELMtEELDtEEL+:u7oUwCE7ElEBEyEK

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Chimera

      Ransomware which infects local and network files, often distributed via Dropbox links.

    • Chimera Ransomware Loader DLL

      Drops/unpacks executable file which resembles Chimera's Loader.dll.

    • Chimera family

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Gandcrab family

    • Modifies Windows Defender Real-time Protection settings

    • Modifies visiblity of hidden/system files in Explorer

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Rms family

    • Windows security bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Renames multiple (3315) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Contacts a large (1162) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Server Software Component: Terminal Services DLL

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Stops running service(s)

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Users

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks