Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 19:19

General

  • Target

    0a8d58dbc4c768a41231603ca4058c5c0b95a41b1335ae4e7c0c5ccf6584f78f.exe

  • Size

    38KB

  • MD5

    cb6eb6b97c1a7840f34633e0a9f5ffb7

  • SHA1

    2f405c2943e375550a0fe872b113c1cd706a8a85

  • SHA256

    0a8d58dbc4c768a41231603ca4058c5c0b95a41b1335ae4e7c0c5ccf6584f78f

  • SHA512

    5ceffe62e52f199875bd6e701b28ec09e259fe0a9ba0dd24cdd8dca6006798242597cfddd3697c4dac5575ca0989aa554f1681419ca4574196e7145c15e20a97

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uA2:CTWn1++PJHJXA/OsIZfzc3/QP

Score
9/10

Malware Config

Signatures

  • Renames multiple (3783) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a8d58dbc4c768a41231603ca4058c5c0b95a41b1335ae4e7c0c5ccf6584f78f.exe
    "C:\Users\Admin\AppData\Local\Temp\0a8d58dbc4c768a41231603ca4058c5c0b95a41b1335ae4e7c0c5ccf6584f78f.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    da62cdcd9fbad799bb236456f7141f0f

    SHA1

    8eb54a361443287d2d3e7f8ab0f1895eb071d00c

    SHA256

    d565d9e43ff23d515e513e46e2328748a8929675632e13e36c50424ffab32353

    SHA512

    1f50a3b1a2bf6566187027d3852a182b53dff2b588fa3f2eaff7f9f560ed6db6ddd5e7aa25208cda79a7cb85aab4d300c4af84f9c522c7cfe6052ecf65cdb4af

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    7e5d20b6bba6b88d1ec8c0c38eb32638

    SHA1

    2663c8d2f044a1fbb5ef138572537d800074f7bd

    SHA256

    cd79065e022faebfe72adeb5b5dd944794c04369a70854507e32e66d3a805643

    SHA512

    2b2a49d81cc562a7dacabcad5bde98f9fd7067f8e1976e6e511b02bd1835808ce2e9f663e6587ccd4f824b0d3417b6d3a19bb2a2fbd7e3b6863c8fb9052d91b3

  • memory/2952-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2952-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB