Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 03:00

General

  • Target

    d17daa2ebe1ec584e79de48e03402cdeaabd9d3b00c65664ba516ea4dde36d27.exe

  • Size

    72KB

  • MD5

    316c490e6fe6ab493b6398c50cdde555

  • SHA1

    72447f4ac07e51625fad397ddc6da4b0f74bfec8

  • SHA256

    d17daa2ebe1ec584e79de48e03402cdeaabd9d3b00c65664ba516ea4dde36d27

  • SHA512

    6966610e89de9a785d3d91f258f18bf14b697cfc2d8e214041c1b0bca4e88d6f854ef8b16aac8a20105984a3c7f2a33b36880726ebeaa3a00e11ff1a5090e6e1

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8xJJMJJJ+T:+nyiQSo2

Score
9/10

Malware Config

Signatures

  • Renames multiple (3709) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d17daa2ebe1ec584e79de48e03402cdeaabd9d3b00c65664ba516ea4dde36d27.exe
    "C:\Users\Admin\AppData\Local\Temp\d17daa2ebe1ec584e79de48e03402cdeaabd9d3b00c65664ba516ea4dde36d27.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3016

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    817bec05f21b3a197a8e5ce6be9b3bb6

    SHA1

    95a236c81a530d52eeee35e348b9f89eb07c66fd

    SHA256

    0c72be79cae8912679721d1156408433f385fac5fe6176b4112dce5f61b62249

    SHA512

    c315b4a165529d7a16e6ab221f65e1b0d089d2ddf0ede0e151ea59a2bb8e7df9ea953d2a88adb4c85ad4fb7c5135b4672d840bf4051197e9b4756a04aa38d56e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    81KB

    MD5

    789bf0dfb0131a56d1e3d751d8c6eae3

    SHA1

    07048e823f658d0f4856889dff341dc401a6894f

    SHA256

    53425e74f8eaafabf86337dff0fe0b17bcb7585a20d02d9753eddcc5b6540775

    SHA512

    17b2a482589a37db384bc81e9ed60f421ebe21d6ea0790848782429ed40fbe86bbbcea112b7d44e21e15e69663bf3bce0ca0b1e478bd39594ee6ecb3f1424821

  • memory/3016-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3016-648-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB