Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    10s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2022, 18:03

General

  • Target

    176722f37ce44018147ee8b10f0eb9805ed4d2ad8e8ffbb48ca275893f118fa7.exe

  • Size

    980KB

  • MD5

    277ba7a4464630efcc96c67999a750df

  • SHA1

    09d46deb015525a0a91b63e2f0962be8d9a6b7fc

  • SHA256

    176722f37ce44018147ee8b10f0eb9805ed4d2ad8e8ffbb48ca275893f118fa7

  • SHA512

    58dddcf762eb45e9a79c0eed6b128e6b9f3136aa721985e8342ee82ea190d58d442ed1d3850f5aba68aeab95a125d037467e4b18cadf4575638d7516bc0b8243

  • SSDEEP

    24576:5xqT31T6WE6I5jKqosOmBbzm2pIsEyEbm1h:Y6WE6IN95Bbzm2uvs

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\176722f37ce44018147ee8b10f0eb9805ed4d2ad8e8ffbb48ca275893f118fa7.exe
    "C:\Users\Admin\AppData\Local\Temp\176722f37ce44018147ee8b10f0eb9805ed4d2ad8e8ffbb48ca275893f118fa7.exe"
    1⤵
      PID:2008

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2008-54-0x0000000000400000-0x00000000004C4000-memory.dmp

      Filesize

      784KB

    • memory/2008-55-0x00000000760D1000-0x00000000760D3000-memory.dmp

      Filesize

      8KB

    • memory/2008-56-0x0000000000400000-0x00000000004C4000-memory.dmp

      Filesize

      784KB