Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 00:29

General

  • Target

    8b125018508f12c0a55a2e5c9cf6357a31efcfcdb7dfb34cfe7ce62695e6439a.exe

  • Size

    120KB

  • MD5

    3caadbd0d11792cb66fd0b61358aeb10

  • SHA1

    752819596d63c1d7a23cdeb7629d335abb8bc4fe

  • SHA256

    8b125018508f12c0a55a2e5c9cf6357a31efcfcdb7dfb34cfe7ce62695e6439a

  • SHA512

    2c47637d7968944a0d4b291bba176c30f961009d791b98f0b509c7c65f0283620dc1fa48d6603b771a060f560e9e6bc3a7ee08d9e6edf3bf8d7d59ccaa0a49ee

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hflix:hfAIuZAIuYSMjoqtMHfhflixik

Score
9/10

Malware Config

Signatures

  • Renames multiple (3438) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b125018508f12c0a55a2e5c9cf6357a31efcfcdb7dfb34cfe7ce62695e6439a.exe
    "C:\Users\Admin\AppData\Local\Temp\8b125018508f12c0a55a2e5c9cf6357a31efcfcdb7dfb34cfe7ce62695e6439a.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2728

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    120KB

    MD5

    0f7574c98d340e7428802f19189f9d1d

    SHA1

    67d3404b0165716474d29d303e2a6de7d2cabef7

    SHA256

    cf03f3117e4b40a26c5545e0dc3fe542d57268f71e5f972f9affb576a6b31d30

    SHA512

    c5bf587895c03fc457c44f7486ff9432e5fd931abacdf6c0142aba390eb5a000f43cb99846da5deaf4c1cfff34ba91313bbd97ed032ccf93e53a6becea58cff5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    129KB

    MD5

    dd24ce2100bc8dcc47e8de4ad54738ba

    SHA1

    d2bbd3121f7d7d0c0fd176bdd50205a6d59df76c

    SHA256

    054c1496fae52d776bd78109f62fd82400d7a750597dc81f79910425df16d11b

    SHA512

    ea85074ba49af290b5d35268785ab46cc09ba1d9214f9a87c0defcfb57a953ae307b55e16f3f6ffd027df1d3884133e111843764e8272de5aaf6bb4a9651515a

  • memory/2728-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2728-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB