Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 21:00

General

  • Target

    443398db06a4017010e37aa7b3d2c9ec99150647c60a80ed867aca53666b1762.exe

  • Size

    262KB

  • MD5

    6231ea1da991cb65948d7a9ae2c3656e

  • SHA1

    9da27515f6cac74782c06c901c22fe33dc24422c

  • SHA256

    443398db06a4017010e37aa7b3d2c9ec99150647c60a80ed867aca53666b1762

  • SHA512

    edad0e519d5a046f1f7ccdf5faebda56fa60eadc3da2007d1187ebb4b94b6251a18aa376df617fcd82aa9a43a35ab4d9067e40b1b1dcb9a512bc85936d1ca83b

  • SSDEEP

    3072:+nymCAIuZAIuYSMjoqtMHfhfew9mHpKZNGCLOwstyhZFChcssc56FUrgxvbSD4Ub:JmCAIuZAIuDMVtM/D9UpK7ShcHUaZs

Score
9/10

Malware Config

Signatures

  • Renames multiple (2987) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\443398db06a4017010e37aa7b3d2c9ec99150647c60a80ed867aca53666b1762.exe
    "C:\Users\Admin\AppData\Local\Temp\443398db06a4017010e37aa7b3d2c9ec99150647c60a80ed867aca53666b1762.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2904

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

    Filesize

    263KB

    MD5

    c236650621b1eec5794cf9a4fc631f3a

    SHA1

    10c26fd5e84aed64c7a5dfc18fa31abce851797f

    SHA256

    08488e0cda864cf3cb2a1adae8e8faa649a761593a230c5c3fac1c9f9abc37d3

    SHA512

    3cebebe413543a11b07afebf9e7506c6ad4ef76c92e12c9d81be6d27b50335b692153a6140b8ce7a4e4b787e02bde6f346d415ce0fd38393f30048054d46d6c4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    271KB

    MD5

    8965885021b467166c5471b0acffd93f

    SHA1

    35db2bf4f6745270a241b09f583afacff394370a

    SHA256

    b383a90e56d64e6d6ec014b10353f435b6e8d95f8db34c09f28fe1471639b0f8

    SHA512

    0f3108ca8290ad34890dee08c7e3ec3c0ecbbd80c9bfb1c90d4373c6df07add9b219ed4a93f7ecf519ebb5ff7ada90c3a97cb59be40f112664f237a386006fda

  • memory/2904-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2904-526-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB