Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2025, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
cats.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cats.exe
Resource
win10v2004-20250313-en
General
-
Target
cats.exe
-
Size
126KB
-
MD5
e0d108435c58dc9403588e4dcab68275
-
SHA1
7a7331423938020550ff3decd2e8b50b3ee5c87a
-
SHA256
61cd0131cb4bf090c5ee7761566f6f7a778e78b37d220f0506f98632a2663ee8
-
SHA512
2a5648ced91b75d928b4d71a8580c5bee75a5f27623f8c5071cd23b8cd85eaa8129ddb0aaf0a1fcca05fb1b7868a0fcd9306e9ddf2d3eaaf605c41cc7fde4a9e
-
SSDEEP
3072:7+gYdgLNp0jPilel4+800N1lknzRxqmhda40U6hrnzRxqmhda40U6hK:6gvunnhdaLlrnnhdaLl
Malware Config
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
Renames multiple (232) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation cats.exe -
Executes dropped EXE 1 IoCs
pid Process 2280 Chrome32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" cats.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\bn.txt Chrome32.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00E2-0409-1000-0000000FF1CE.xml Chrome32.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\RenderingControl_DMP.xml Chrome32.exe File created C:\Program Files\Microsoft Office\ThinAppXManifest.xml.cat Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt Chrome32.exe File created C:\Program Files\7-Zip\Lang\sa.txt.cat Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\AppxManifest.xml Chrome32.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\AssemblyList_4_extended.xml Chrome32.exe File created C:\Program Files\7-Zip\Lang\ja.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\lv.txt.cat Chrome32.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00A1-0409-1000-0000000FF1CE.xml Chrome32.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\RenderingControl.xml Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt Chrome32.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00E2-0409-1000-0000000FF1CE.xml.cat Chrome32.exe File created C:\Program Files\VideoLAN\VLC\NEWS.txt.cat Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\webviewBoot.min.js Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\AppxManifest.xml Chrome32.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\DMR_120.png Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt Chrome32.exe File created C:\Program Files\7-Zip\Lang\th.txt.cat Chrome32.exe File created C:\Program Files\Java\jre-1.8\README.txt.cat Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Protocol.xml Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\AppxManifest.xml Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxManifest.xml Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_2019.729.2301.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml Chrome32.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_120.png Chrome32.exe File created C:\Program Files\7-Zip\Lang\uk.txt.cat Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\AppxManifest.xml Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt Chrome32.exe File created C:\Program Files\Java\jdk-1.8\jvisualvm.txt.cat Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_2020.1906.55.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt Chrome32.exe File created C:\Program Files\7-Zip\Lang\mk.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\nb.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\pt-br.txt.cat Chrome32.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00C1-0409-1000-0000000FF1CE.xml Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\AppxManifest.xml Chrome32.exe File created C:\Program Files\7-Zip\Lang\fy.txt.cat Chrome32.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0016-0000-1000-0000000FF1CE.xml Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml Chrome32.exe File opened for modification C:\Program Files\ClearRestart.png Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt Chrome32.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.common.16.xml Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxManifest.xml Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxBlockMap.xml Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml Chrome32.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt Chrome32.exe File created C:\Program Files\7-Zip\Lang\io.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\lt.txt.cat Chrome32.exe File created C:\Program Files\7-Zip\Lang\ro.txt.cat Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Advertising.Xaml_10.1808.3.0_x64__8wekyb3d8bbwe\AppxManifest.xml Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\BuildInfo.xml Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_2019.430.2026.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_2019.19071.19011.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml Chrome32.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.common.16.xml.cat Chrome32.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\ContentDirectory.xml Chrome32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml Chrome32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5824 wrote to memory of 2280 5824 cats.exe 85 PID 5824 wrote to memory of 2280 5824 cats.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\cats.exe"C:\Users\Admin\AppData\Local\Temp\cats.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5824 -
C:\Users\Admin\AppData\Local\Google (x86)\Chrome32.exe"C:\Users\Admin\AppData\Local\Google (x86)\Chrome32.exe" C:\Users\Admin\AppData\Local\Temp\cats.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5e0d108435c58dc9403588e4dcab68275
SHA17a7331423938020550ff3decd2e8b50b3ee5c87a
SHA25661cd0131cb4bf090c5ee7761566f6f7a778e78b37d220f0506f98632a2663ee8
SHA5122a5648ced91b75d928b4d71a8580c5bee75a5f27623f8c5071cd23b8cd85eaa8129ddb0aaf0a1fcca05fb1b7868a0fcd9306e9ddf2d3eaaf605c41cc7fde4a9e