Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20/03/2025, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
Chrome32.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Chrome32.exe
Resource
win10v2004-20250314-en
General
-
Target
Chrome32.exe
-
Size
126KB
-
MD5
e0d108435c58dc9403588e4dcab68275
-
SHA1
7a7331423938020550ff3decd2e8b50b3ee5c87a
-
SHA256
61cd0131cb4bf090c5ee7761566f6f7a778e78b37d220f0506f98632a2663ee8
-
SHA512
2a5648ced91b75d928b4d71a8580c5bee75a5f27623f8c5071cd23b8cd85eaa8129ddb0aaf0a1fcca05fb1b7868a0fcd9306e9ddf2d3eaaf605c41cc7fde4a9e
-
SSDEEP
3072:7+gYdgLNp0jPilel4+800N1lknzRxqmhda40U6hrnzRxqmhda40U6hK:6gvunnhdaLlrnnhdaLl
Malware Config
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
Renames multiple (238) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 2392 Chrome32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" Chrome32.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\README.txt Chrome32.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.jpg Chrome32.exe File created C:\Program Files\7-Zip\Lang\co.txt.cat Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt Chrome32.exe File created C:\Program Files\7-Zip\Lang\si.txt.cat Chrome32.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaireMCE.png Chrome32.exe File created C:\Program Files\VideoLAN\VLC\THANKS.txt.cat Chrome32.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceSimplifiedZhengMa.txt Chrome32.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\AssemblyList_4_extended.xml.cat Chrome32.exe File created C:\Program Files\ShowSelect.pptm.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\cy.txt.cat Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt Chrome32.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlaceMCE.png Chrome32.exe File created C:\Program Files\7-Zip\Lang\kab.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\ko.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\sq.txt.cat Chrome32.exe File created C:\Program Files\Java\jre7\README.txt.cat Chrome32.exe File opened for modification C:\Program Files\HideProtect.xls Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt Chrome32.exe File created C:\Program Files\7-Zip\Lang\hi.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\kk.txt.cat Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt Chrome32.exe File created C:\Program Files\7-Zip\Lang\sv.txt.cat Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt Chrome32.exe File created C:\Program Files\7-Zip\Lang\et.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\zh-tw.txt.cat Chrome32.exe File opened for modification C:\Program Files\Internet Explorer\en-US\eula.rtf Chrome32.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Mso Example Setup File A.txt Chrome32.exe File created C:\Program Files\VideoLAN\VLC\NEWS.txt.cat Chrome32.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color32.jpg Chrome32.exe File created C:\Program Files\7-Zip\Lang\ru.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\tr.txt.cat Chrome32.exe File created C:\Program Files (x86)\Microsoft Office\Office14\SketchPadTestSchema.xml.cat Chrome32.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\DMR_48.jpg Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt Chrome32.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.png Chrome32.exe File created C:\Program Files\7-Zip\Lang\be.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\ku-ckb.txt.cat Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt Chrome32.exe File created C:\Program Files\7-Zip\Lang\sw.txt.cat Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt Chrome32.exe File opened for modification C:\Program Files\VideoLAN\VLC\COPYING.txt Chrome32.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw120.png Chrome32.exe File created C:\Program Files\7-Zip\Lang\ca.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\ga.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\ms.txt.cat Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt Chrome32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\THIRDPARTYLICENSEREADME-JAVAFX.txt Chrome32.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.Interop.InfoPath.SemiTrust.xml.cat Chrome32.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.bmp Chrome32.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\DMR_120.png Chrome32.exe File created C:\Program Files\ReadAssert.txt.cat Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt Chrome32.exe File created C:\Program Files\7-Zip\Lang\sa.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\sr-spc.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\ug.txt.cat Chrome32.exe File created C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt.cat Chrome32.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.bmp Chrome32.exe File created C:\Program Files\7-Zip\Lang\ar.txt.cat Chrome32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.BusinessData.xml Chrome32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2392 2416 Chrome32.exe 30 PID 2416 wrote to memory of 2392 2416 Chrome32.exe 30 PID 2416 wrote to memory of 2392 2416 Chrome32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Chrome32.exe"C:\Users\Admin\AppData\Local\Temp\Chrome32.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Google (x86)\Chrome32.exe"C:\Users\Admin\AppData\Local\Google (x86)\Chrome32.exe" C:\Users\Admin\AppData\Local\Temp\Chrome32.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5e0d108435c58dc9403588e4dcab68275
SHA17a7331423938020550ff3decd2e8b50b3ee5c87a
SHA25661cd0131cb4bf090c5ee7761566f6f7a778e78b37d220f0506f98632a2663ee8
SHA5122a5648ced91b75d928b4d71a8580c5bee75a5f27623f8c5071cd23b8cd85eaa8129ddb0aaf0a1fcca05fb1b7868a0fcd9306e9ddf2d3eaaf605c41cc7fde4a9e
-
Filesize
9KB
MD56fced57c3e0da0cadb74c7da556b5c09
SHA1a846488cc407c36cb8d210733aec6cdaff429b20
SHA256fb594a4022ab2bced6bd7ad19c0943b79b3b8445b19f2be8cb5017a0e4cd7d48
SHA5120dc91d15086ea3619c235aab9a57a0bf02bfd73ba4be1ab6e72ad220e265754c3e13e47d065943cb069cbb0b2fcfc242ad17e3449d9da6cdf61164e278e665ac