Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 21:27

General

  • Target

    1c46d2658670d42c6133f06b4bcdbb10a022dec79f756b1c9f169a695dc13a5c.exe

  • Size

    68KB

  • MD5

    5b66fc912abe94167f4a53f8a7d37c93

  • SHA1

    282c5d62080049fa9283f9add88823677a340377

  • SHA256

    1c46d2658670d42c6133f06b4bcdbb10a022dec79f756b1c9f169a695dc13a5c

  • SHA512

    f4e0d74be1e3a207c43d8c13963c1790aefb6ec0282d6c59b9081726511449b5747f865c78bfc53b8dbe18faef8cdfe7d2cc06ebd73fbc4403c9f5449504b9b9

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZISWh7SWh30Da0De:+nyi/SWh7SWhT

Score
9/10

Malware Config

Signatures

  • Renames multiple (3688) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c46d2658670d42c6133f06b4bcdbb10a022dec79f756b1c9f169a695dc13a5c.exe
    "C:\Users\Admin\AppData\Local\Temp\1c46d2658670d42c6133f06b4bcdbb10a022dec79f756b1c9f169a695dc13a5c.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3016

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    68KB

    MD5

    6fe5d2ec7171a54cca90be8d688fc115

    SHA1

    077d08a21327c1c7ae909f9adaac82c57b7222f7

    SHA256

    427af853cd5fa12288c88f1d4f8575182e9d2dceb7a2ac798b248bd26bbd5d2f

    SHA512

    e869581e0b78cb166c1c23af40ea08be7c42f30e559103b0be9fe986cddfdbb97988087ad1d953fc0c8c427d863d4cf86ecff18e437a65028b765c1ef1d19359

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    77KB

    MD5

    38efe4eeb80590ce52fc0a022e3b90e3

    SHA1

    d443c839141e60c948afbe1f60f24a37d9c35635

    SHA256

    18be333d37d537ee66734f5a39c19daf4842ad07bdd4693fa2f7499d49ec8fad

    SHA512

    356853ed5254bc25dd7ceb5d2c8a6dbca5f1f6c6d7f6e34c046da30efcff405e7eca9399b8d8b758d7087497c3dbb505d723dfff4ca609b3d9e02a322134b3c6

  • memory/3016-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3016-650-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB