Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.zip
-
Size
14KB
-
Sample
250321-wqm2zaynx3
-
MD5
9d42be3dd26a6d0e60dd31268639f488
-
SHA1
f03d703094346261e28502806b239d711a4a281e
-
SHA256
612e851ac60cc1e0489b1071970a39f1011589d41f2cebe4be6f0837c9ecc788
-
SHA512
f8d95bc4eb25bf880ffb8b85ca73d5654ecf3a53f6b272e984f79abcc94a900211c084eb590851042833a6945cb87c1050a83750f712d5d823a8f7dd2d6e8047
-
SSDEEP
384:O/E9dP1GU4FM0LnH9ADfJzEpE37bRI6jsQU:Xkp/ndADfqs56QU
Static task
static1
Behavioral task
behavioral1
Sample
30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\cs-CZ\How To Restore Your Files.txt
https://i.imgur.com/RzYzVnY.png
https://i.imgur.com/kJzIOqn.png
https://i.imgur.com/bFdNbyO.png
http://babukq4e2p4wu4iq.onion/login.php?id=0KflFXBAmSHtJrtKWtOPzxZmhJATon
Targets
-
-
Target
30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe
-
Size
31KB
-
MD5
dd7f88a68a76acc0be9eb0515d54a82a
-
SHA1
ca205a28b8dbd74c60fdeaf522804d5a2a45dd0b
-
SHA256
30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8
-
SHA512
8e99c1d3291dacaf13c7aff75549d50484b593022bdb82cb3ecffd58f0bbf1dd1ae4deeb09f072d4c3f1b8918a0bc785a397143863466975dad950e115db5af6
-
SSDEEP
768:73QN4DGrqBLP977YowZe478mR26fgjVyBm8Je7tFv/7iJFzMWe:7gdoT93DaRXf5B+tFcJe
-
Babuk family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (411) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1