Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 20:38

General

  • Target

    38a837c629181a67436c7f40535860255bca3e2dbd1f95fdc60de746d392a0b3.exe

  • Size

    109KB

  • MD5

    48134c43652e540ff3fdd904ca96aaa6

  • SHA1

    021cab1a9935bd14cc6ee82a5fe63fcee19f5373

  • SHA256

    38a837c629181a67436c7f40535860255bca3e2dbd1f95fdc60de746d392a0b3

  • SHA512

    59730ada485cfa3d0a08140518e9fc4add6101ef509c4d9ce68f432c403f10d20e4a2314e3efd298b15e8043ee9c9aa748fbe486bd7dc7e56c91e90b4a446ea5

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfS/j:hfAIuZAIuYSMjoqtMHfhfqnj

Score
9/10

Malware Config

Signatures

  • Renames multiple (3433) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38a837c629181a67436c7f40535860255bca3e2dbd1f95fdc60de746d392a0b3.exe
    "C:\Users\Admin\AppData\Local\Temp\38a837c629181a67436c7f40535860255bca3e2dbd1f95fdc60de746d392a0b3.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2732

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    110KB

    MD5

    66deb6e4308803c6069495ec242ef815

    SHA1

    e9ef3d4a8c356a6e494be09f2aea84c75504ff23

    SHA256

    3420024c6dedc56e3b6eecc72d43b1bab4c8f5581965bf4d1ec036aeb5eebf24

    SHA512

    52bf7d8e059b6a32ad2fc5d5cf09c17b230af38e81b38120c7968b03c1b264fb0996d02f6c0a41bcad11d1d2e852ab8a327002391aa4b10665df5436eaa3438f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    119KB

    MD5

    bd4b4f800124548389ad01387b103c6c

    SHA1

    edc5185e6f12e6fa93bccf8fd0d133053aebf66f

    SHA256

    9e46108ef99c9ba381606b4be00f71a87cbc4340acb73c9047f423d22190f790

    SHA512

    d1e66e979373a4af7ecba16f4919fbed0b4bd12879c2e37b4630637f152fab891d59fce6e46b5fc005921ea5aaafac55b263d9800417a3922f8da131c5269b0d

  • memory/2732-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2732-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB