Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2024, 23:20

General

  • Target

    73a0b9f18ef44b99c83e708093319634823e5e5349007e36354fe08edc608dbf.exe

  • Size

    96KB

  • MD5

    7d4db4bf4b920361a32f2b58acfef9eb

  • SHA1

    70dd77dbf214eaf7a2f0a5403ef191b7ea00a709

  • SHA256

    73a0b9f18ef44b99c83e708093319634823e5e5349007e36354fe08edc608dbf

  • SHA512

    5ce5330375ad264451900bb7cde19425b3fb13c888d2649b8e848960aaf5009c262f6107eb1675d5fc062112ea31b2e95e42cc35febcf15a8d42ba5bc64c783a

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfB+:hfAIuZAIuYSMjoqtMHfhfB+

Score
9/10

Malware Config

Signatures

  • Renames multiple (3479) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73a0b9f18ef44b99c83e708093319634823e5e5349007e36354fe08edc608dbf.exe
    "C:\Users\Admin\AppData\Local\Temp\73a0b9f18ef44b99c83e708093319634823e5e5349007e36354fe08edc608dbf.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3048

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    96KB

    MD5

    5d9d665896674321e16e7f7b67adab3a

    SHA1

    a5d7430cc077940b6732bb06335dce5d32d0b72c

    SHA256

    0b94528dda8e86a6b2c568680039c5c6800b81cec1525b4c4ff1c1263d6cdef9

    SHA512

    4242ca33f3d6e4bbb26ad463bc34ee176149ee2fece004ecec8ce536cf74daa59c2d3593e01aab70b242a0cfc3ab3e647ef834c8a1c9027dcfde63f54d22888a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    105KB

    MD5

    5cff89c53caaa16246a0c4202ac138f5

    SHA1

    5bf9e3b2597a4b5d151bb6c299011492e8813d1b

    SHA256

    528da0666e372ac9078a996bf5ed8ce2537c695d22806d75c97300e216d07e1d

    SHA512

    5f1a9272692b92eead94c70b19ded7924fcce000f91a3875e0613d3ca8f33940aabb23265fb0e076812872447b87e345f245c921bf8082a045a995a49053d4bc

  • memory/3048-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3048-82-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB