Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 01:30

General

  • Target

    b707ed5bf6d65f96d2ddee3ed9120894819b053e0d77c01acf65b9df31e6a647.exe

  • Size

    40KB

  • MD5

    9133c45c4dc2bc40a8721d6ea5384ea6

  • SHA1

    3d1466aa0edb7880d16b171f8ac10f3b416a69b3

  • SHA256

    b707ed5bf6d65f96d2ddee3ed9120894819b053e0d77c01acf65b9df31e6a647

  • SHA512

    add4d293f4de44dbe0d260bed36e3d7c35b3e00ec6650709460acc9215ae8f3900314b4cdfbabf2eba2ef10920418675ecd2982a2767e81f754162d9181402c1

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFc:CTWn1++PJHJXA/OsIZfzc3/Q8c

Score
9/10

Malware Config

Signatures

  • Renames multiple (3501) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b707ed5bf6d65f96d2ddee3ed9120894819b053e0d77c01acf65b9df31e6a647.exe
    "C:\Users\Admin\AppData\Local\Temp\b707ed5bf6d65f96d2ddee3ed9120894819b053e0d77c01acf65b9df31e6a647.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1676

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    76ab3d96f759f3dfde5d098f813660ed

    SHA1

    2b73ec15b0dc77375f68f6c46a7479ccfd964949

    SHA256

    019e4ed223c58f15f5ca1ea6968c198da13763c8decc0de6eae9a23fb482ba14

    SHA512

    943ea9d457488273e3ce84af16ebb357b2df8fd2703f83cee29c607dd64751b74ee4aa86ef826a787faad45dd4f07e26af007b10034469211fafa7d33859f4c5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    9fe1a0bec639c0570b1d6cc99b3ad659

    SHA1

    e2348608600ad56a4f6546d7385a68ceac0e7530

    SHA256

    ad35a4d9f36f1da3ef2a2afda5690a5d56db6663708dc4c76cb0604b360eb605

    SHA512

    f6282f11513b93fb26afab26bec74fafb0c7988be0bc3b34046e2988cecdff1acb96c986ca685637fc5f2e0c83a4ae0d6297375147a225115f5151d118403163

  • memory/1676-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1676-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB