Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 01:23

General

  • Target

    8e15967e6a6188319f4fd837115a8e1b1609f2b48e410ad039df9cb02dbfcc07.exe

  • Size

    40KB

  • MD5

    8a8150afa0511c7e6e72f63b01cdc2af

  • SHA1

    f68ca1e7c729c938970ad1350af7f61aebbd8efb

  • SHA256

    8e15967e6a6188319f4fd837115a8e1b1609f2b48e410ad039df9cb02dbfcc07

  • SHA512

    d3ce04ad50003269ee5c8077aee1f4ced3bf92eba613964bc9b29729404542296f1ff4754a2c58dec08d79efce68dde3536f8d5ba80838981c325632302bc74d

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2bTgT6:CTWn1++PJHJXA/OsIZfzc3/QbUW

Score
9/10

Malware Config

Signatures

  • Renames multiple (3897) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e15967e6a6188319f4fd837115a8e1b1609f2b48e410ad039df9cb02dbfcc07.exe
    "C:\Users\Admin\AppData\Local\Temp\8e15967e6a6188319f4fd837115a8e1b1609f2b48e410ad039df9cb02dbfcc07.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1432

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    646fcd2901be82ef64a88307d1aff07a

    SHA1

    30d1bd612ce018d0850f3b5ac7c2af4c2f0f9f4d

    SHA256

    72a1f476e06833c2c6317491fc6ef70108b24582c7db75c8ad4bd0369d3e293d

    SHA512

    4321eb00c09e99000acdfa31168fb1b920b37a6cc03c8829332d6baab2d3cd4a908991459fa704243a005e801b7f98b5b7b009bc88b7b7f12800b6ab38e2afb9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    56608ba8929f8ca1a43bb274ce9c2107

    SHA1

    7c3ec75264f253f0b605faf00368c7965675044a

    SHA256

    637efddfc7e0460afde80d776f25eff66e40f8ec8c9c355b773d41b7be14ef13

    SHA512

    752b2e6af9a2bced03246dfef31cd6eb5321f14fd8dc614029102244c08652ced9e39545eea00089d4162c94c965fa8e6488a66af45f0a3d68654b66365d4427

  • memory/1432-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1432-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB