Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 22:18

General

  • Target

    5d5dbbc2a4e70ab39b1fddaef3a276f8777920c875ddad71a337d61837675cbc.exe

  • Size

    123KB

  • MD5

    759bb167bde3f9e915d61bb7b0a63f04

  • SHA1

    0f94867e2b22b15f0dac021e7b275de1d2040c3d

  • SHA256

    5d5dbbc2a4e70ab39b1fddaef3a276f8777920c875ddad71a337d61837675cbc

  • SHA512

    3588de479e24f30897a478d5816c343a8abc510a46eda9382f3c6a02e4d705a221aa0b6cd4a497621394d44780a9ab743cddbc662b4c3187626b5ab2cdd998b8

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCy:+nymCAIuZAIuYSMjoqtMHfhf5SskW

Score
9/10

Malware Config

Signatures

  • Renames multiple (3434) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d5dbbc2a4e70ab39b1fddaef3a276f8777920c875ddad71a337d61837675cbc.exe
    "C:\Users\Admin\AppData\Local\Temp\5d5dbbc2a4e70ab39b1fddaef3a276f8777920c875ddad71a337d61837675cbc.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1812

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    123KB

    MD5

    8de5360aa6543cfd91eafa3501be46b0

    SHA1

    1104adf7f049669c55f5f3844304350be69ecafe

    SHA256

    f111ae5115fd6f1ec76c2e627f037b24ad4226c1a7317b34a9952ea301759655

    SHA512

    8f2696928c1d1b4415c31f82ac1dcc776868701c00e5216b6d12700f59fc374d82decd67d3648d3f4c01a0a1da3ff59509d6350bd96df2f9659751a986ad080e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    132KB

    MD5

    a35a4ddf868cfc29ec6201845bf47b64

    SHA1

    97dd7520366c95fdd4a7c361d84785946862de25

    SHA256

    ee753e2c4c096378c0f9f177187e5c58568511e5032662fa1a47a8614dd1d871

    SHA512

    a2cb7cd5c2a88cc2c003128359b315e6f27b83ef2a15aa2220bf76c1519075acea48644f5b1f25a1366bcc7363b30c70f835ace35907c269719c421d0ec51d2a

  • memory/1812-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1812-644-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB