Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 04:02

General

  • Target

    c86277b0f432cfa8ef56e07a6c1ea7f4872d5fa1b2ff417a7d6feedf867eba61.exe

  • Size

    103KB

  • MD5

    e2d01fdff3134be581bdf24b4416a414

  • SHA1

    accf13225735862a98040b6b506e46e0e5e67891

  • SHA256

    c86277b0f432cfa8ef56e07a6c1ea7f4872d5fa1b2ff417a7d6feedf867eba61

  • SHA512

    08576fc4e4b343c180f29e12c916068eb3ea8baf9c7b9b6a9923798bdb74004d768e7958a1956eaa1b7eba1b04aed35e189d02149af504489a8adebd435a0d63

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf0xW:hfAIuZAIuYSMjoqtMHfhfH

Score
9/10

Malware Config

Signatures

  • Renames multiple (3478) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c86277b0f432cfa8ef56e07a6c1ea7f4872d5fa1b2ff417a7d6feedf867eba61.exe
    "C:\Users\Admin\AppData\Local\Temp\c86277b0f432cfa8ef56e07a6c1ea7f4872d5fa1b2ff417a7d6feedf867eba61.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2756

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp

    Filesize

    104KB

    MD5

    4aaed9ec00e88489e86041657efa6410

    SHA1

    54c1cb2c50249bf1dffcd92c9a997d54858d24ce

    SHA256

    7b922f1bfcb4122aa971437700fe5bb4f39c9393b9cc0bb8c2e317288c75b246

    SHA512

    2713497ada5aa702abb80632ad163cb91cb4e64656b2ec510b274b53977f19e32783a6f3d79ddebccacedc3fad28bf2dbda7bb3610a0abcbed3dbc8d62d93997

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    113KB

    MD5

    218c456e85ff4ecb37f7b67ba49a7557

    SHA1

    35ae28d049ff2e0d59cb6a6a34af5f536ea0bf02

    SHA256

    99458853705275df1d82fe7a6ca8f5f52ae3e46a94e9f8d32f0374689ee11da6

    SHA512

    f050fde390797179bfd4033e54c1898ca5e1bcb794f196f5475a3c1d9567b89d4680b903eb75361f6acaaa2d56bbbb84d16cfc40f67322c8abab2b7a55631b68

  • memory/2756-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2756-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB