Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/03/2025, 23:20

General

  • Target

    cats.exe

  • Size

    126KB

  • MD5

    e0d108435c58dc9403588e4dcab68275

  • SHA1

    7a7331423938020550ff3decd2e8b50b3ee5c87a

  • SHA256

    61cd0131cb4bf090c5ee7761566f6f7a778e78b37d220f0506f98632a2663ee8

  • SHA512

    2a5648ced91b75d928b4d71a8580c5bee75a5f27623f8c5071cd23b8cd85eaa8129ddb0aaf0a1fcca05fb1b7868a0fcd9306e9ddf2d3eaaf605c41cc7fde4a9e

  • SSDEEP

    3072:7+gYdgLNp0jPilel4+800N1lknzRxqmhda40U6hrnzRxqmhda40U6hK:6gvunnhdaLlrnnhdaLl

Malware Config

Signatures

  • Jigsaw Ransomware

    Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

  • Jigsaw family
  • Renames multiple (2001) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cats.exe
    "C:\Users\Admin\AppData\Local\Temp\cats.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Users\Admin\AppData\Local\Google (x86)\Chrome32.exe
      "C:\Users\Admin\AppData\Local\Google (x86)\Chrome32.exe" C:\Users\Admin\AppData\Local\Temp\cats.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif.cat

    Filesize

    160B

    MD5

    a8258060e35cd08265a3f658e6aa2963

    SHA1

    a67c6aeb6db7a488c84810feea22a2d6f7be9bc8

    SHA256

    e847f277e6adf5f94573c0f1b10ac15efd6ca48f34f9be52e9baec6e1f1de04b

    SHA512

    70ecf38aa25d92ffff7a24ea35c467c95b9a22dfdc99e0705d56527923cda574add21987ab98ae2b8c589e334141d6957a660a3e34a546c764c3e42069f50d45

  • C:\Users\Admin\AppData\Local\Google (x86)\Chrome32.exe

    Filesize

    126KB

    MD5

    e0d108435c58dc9403588e4dcab68275

    SHA1

    7a7331423938020550ff3decd2e8b50b3ee5c87a

    SHA256

    61cd0131cb4bf090c5ee7761566f6f7a778e78b37d220f0506f98632a2663ee8

    SHA512

    2a5648ced91b75d928b4d71a8580c5bee75a5f27623f8c5071cd23b8cd85eaa8129ddb0aaf0a1fcca05fb1b7868a0fcd9306e9ddf2d3eaaf605c41cc7fde4a9e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DNTException\container.dat.cat

    Filesize

    16B

    MD5

    a2ec71f236b0da26c756b086bd502f09

    SHA1

    e9dc21e143a2aba3ca9eb634ed291ddf93b32e4b

    SHA256

    b4805a7f3e187212efacd5c2475bc8a30ce7274f8dae65858537a7f08b866717

    SHA512

    a1d0f50c760c9bc3ab50053633e2fd3bdca6d0de8f256b48b5c45c8bc20a93a7e2123b09c8ce5de3c9ef013d0f2c3de165d68f7748c89d629122ae6d498e9af3

  • C:\Users\Admin\AppData\Roaming\System32Work\EncryptedFileList.txt

    Filesize

    189KB

    MD5

    8bd420ffc2d725d3e54bcd7b9ee0e43c

    SHA1

    1365c71c36c0d138b18da792731863650246035d

    SHA256

    902a6719d9a5013d54692824398a5c4cea05fad616a263000d28aaf727f9c9dc

    SHA512

    066bfa93d89bf3d12503a05f82cbbe8050a12b98ed299808f6439e59b2227ad56fbde7fa30effe39e2b5ad62f3a20850780a3ebaca935cbf172c4cc67f7c2f63

  • C:\Users\Admin\Documents\ImportRedo.xlsx.cat

    Filesize

    10KB

    MD5

    b1110b48b47bc1af30f976237c291ab6

    SHA1

    b752ece3ae5708fce4d8e191aaa4b0efb1e10abe

    SHA256

    6d25a3b0389e59229f7ad2dfae6719c7e0991af046a6ae8bea859177fb1df9ef

    SHA512

    5f32c1ad9a395385792d8c696844deaa54619129a8890bbbae119f82c85ed9dcbc2e664a0e3ae3de2c710679fa7416108948df602c0216e7eae36b6799488760

  • memory/2804-7-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-0-0x000007FEF56FE000-0x000007FEF56FF000-memory.dmp

    Filesize

    4KB

  • memory/2876-8-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-11-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-10-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-2020-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-2025-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-2028-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-9-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-2041-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-2146-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-2145-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-2232-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-2264-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp

    Filesize

    9.6MB