Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 19:07

General

  • Target

    185734612dafd25162c0b3ebba015c9b20699b8bfc9c8cbbb959bd51ca56b110.exe

  • Size

    107KB

  • MD5

    4716b896173bee922c797693ffeadd91

  • SHA1

    f7000396d620623bb43386c09bc83961879ae624

  • SHA256

    185734612dafd25162c0b3ebba015c9b20699b8bfc9c8cbbb959bd51ca56b110

  • SHA512

    ab925043ed943579c96b95ce025ec140cf810395ce40fb6528b88255216bd205be87a49999fb861c8ab4750dc7628add6c7036730b4515e7ad49133ea90190fe

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfS/B:hfAIuZAIuYSMjoqtMHfhfqnB

Score
9/10

Malware Config

Signatures

  • Renames multiple (3444) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\185734612dafd25162c0b3ebba015c9b20699b8bfc9c8cbbb959bd51ca56b110.exe
    "C:\Users\Admin\AppData\Local\Temp\185734612dafd25162c0b3ebba015c9b20699b8bfc9c8cbbb959bd51ca56b110.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1988

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    108KB

    MD5

    5c86167c3fdab3a7d46add82ff9e4c70

    SHA1

    22872542dd016b371e2607cfe917faf75d5dac4f

    SHA256

    54cd4b250f5798de4e0ced1c20187d8f73813e63303e83ebaf67ccb0a75e504f

    SHA512

    73144e6a35eadd6ecbdc95a90289ae19a5f802816a024d220423a99a7004f0639e034edbeb6ea2426a8db61a9fe3d4928c1f1412d355f596ab170f5fc3aec950

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    117KB

    MD5

    b62aad165f562ecb836abe0d20681be3

    SHA1

    4d77a6c1377ffc2bac4e31c41f6816d2eb6af8d8

    SHA256

    7b4f2102278140e416c6bd5fa8b75ad9bd923155339c75ce47e4ceb90c2ee9be

    SHA512

    cb41e689c9b0d90808e27f0dce8535ee0527ba388b37e1de4b55f3b16d919d95eb1cc3dee75061cf941b696795455a5f911cdb24f3c98b4f69a72f9145d01b88

  • memory/1988-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1988-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB