Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 19:19 UTC

General

  • Target

    0a8d58dbc4c768a41231603ca4058c5c0b95a41b1335ae4e7c0c5ccf6584f78f.exe

  • Size

    38KB

  • MD5

    cb6eb6b97c1a7840f34633e0a9f5ffb7

  • SHA1

    2f405c2943e375550a0fe872b113c1cd706a8a85

  • SHA256

    0a8d58dbc4c768a41231603ca4058c5c0b95a41b1335ae4e7c0c5ccf6584f78f

  • SHA512

    5ceffe62e52f199875bd6e701b28ec09e259fe0a9ba0dd24cdd8dca6006798242597cfddd3697c4dac5575ca0989aa554f1681419ca4574196e7145c15e20a97

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uA2:CTWn1++PJHJXA/OsIZfzc3/QP

Score
9/10

Malware Config

Signatures

  • Renames multiple (3783) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a8d58dbc4c768a41231603ca4058c5c0b95a41b1335ae4e7c0c5ccf6584f78f.exe
    "C:\Users\Admin\AppData\Local\Temp\0a8d58dbc4c768a41231603ca4058c5c0b95a41b1335ae4e7c0c5ccf6584f78f.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    da62cdcd9fbad799bb236456f7141f0f

    SHA1

    8eb54a361443287d2d3e7f8ab0f1895eb071d00c

    SHA256

    d565d9e43ff23d515e513e46e2328748a8929675632e13e36c50424ffab32353

    SHA512

    1f50a3b1a2bf6566187027d3852a182b53dff2b588fa3f2eaff7f9f560ed6db6ddd5e7aa25208cda79a7cb85aab4d300c4af84f9c522c7cfe6052ecf65cdb4af

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    7e5d20b6bba6b88d1ec8c0c38eb32638

    SHA1

    2663c8d2f044a1fbb5ef138572537d800074f7bd

    SHA256

    cd79065e022faebfe72adeb5b5dd944794c04369a70854507e32e66d3a805643

    SHA512

    2b2a49d81cc562a7dacabcad5bde98f9fd7067f8e1976e6e511b02bd1835808ce2e9f663e6587ccd4f824b0d3417b6d3a19bb2a2fbd7e3b6863c8fb9052d91b3

  • memory/2952-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2952-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.