Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 18:15

General

  • Target

    032732b677aa04c6e15e299417f1bed5934adc56973be92f3a6a6bf937faf48e.exe

  • Size

    107KB

  • MD5

    64baa5340e1d221e510d80d228c878dc

  • SHA1

    7334c581a458f5443c02b128acd6783d33ec09e7

  • SHA256

    032732b677aa04c6e15e299417f1bed5934adc56973be92f3a6a6bf937faf48e

  • SHA512

    2276a4770756e2d21150df7edb25f05718da9bf556b93b3c41ea5af93a22dc56594ca746e9138432e9e1fbb71495cc25ced3fa9f7bcb8b512b31348d93ea7136

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfVyc:hfAIuZAIuYSMjoqtMHfhftEo

Score
9/10

Malware Config

Signatures

  • Renames multiple (333) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\032732b677aa04c6e15e299417f1bed5934adc56973be92f3a6a6bf937faf48e.exe
    "C:\Users\Admin\AppData\Local\Temp\032732b677aa04c6e15e299417f1bed5934adc56973be92f3a6a6bf937faf48e.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2461186416-2307104501-1787948496-1000\desktop.ini.tmp

    Filesize

    107KB

    MD5

    5fe059dee9dd2e26339318a8c058fbc1

    SHA1

    77e83ac8bf6fd03af52c62039e56313c334c8129

    SHA256

    fad7e1ff8ab10f83d5422f89230ca53311477f139dba5ece02bacd957af0f421

    SHA512

    2fe25fc49b7503c86902c1f2bfd1f98ff0cf4c4948ec0faa7686a69e2a7aaede389b5170a2ab0daf2182f072e0cab41c222ad0ba56b685d7bdf19bca3f05cb8d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    116KB

    MD5

    d1140b600e9595e505d7b4fed3874a2f

    SHA1

    7b77a3c4ace64c790cc1d371791136233fed3724

    SHA256

    ee71d299ae3ea63a43136cf055a5115b1676a8debd944dd116f93c31026cf685

    SHA512

    734d360519d742711145910b63ea0e89c1649f32216db5f3a4f39300c91ddb3b55a3b19279d3892b468f0b16c6abd99fd820f3f8a2bda81c1f5f787803a2f0ea

  • memory/3032-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3032-20-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB