Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/06/2024, 06:24

General

  • Target

    bd4fd59f40ea677d6d19ed43395772faf8174b91b19f3cd1d41b8390448ea9fc.exe

  • Size

    69KB

  • MD5

    f997e599ed22fb4bb4713de12448f793

  • SHA1

    433d2cf761cbe918f53558fed97f2675397f0bd5

  • SHA256

    bd4fd59f40ea677d6d19ed43395772faf8174b91b19f3cd1d41b8390448ea9fc

  • SHA512

    a933f8800995cd16d9616154d93d96a196936d7b8b317d70dca59bf56e110aab64077b3354aced110593aac363d14b9bfdab0248a141b7b103624903c552f836

  • SSDEEP

    768:a7BlpyqaFAK65eCv+cIA0fm7Nm0CAbLg++PJHJzIWD4adZdhAIuZAIuniX74l4O:a7ZyqaFAlsr1++PJHJXFAIuZAIuA87

Score
9/10

Malware Config

Signatures

  • Renames multiple (589) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd4fd59f40ea677d6d19ed43395772faf8174b91b19f3cd1d41b8390448ea9fc.exe
    "C:\Users\Admin\AppData\Local\Temp\bd4fd59f40ea677d6d19ed43395772faf8174b91b19f3cd1d41b8390448ea9fc.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1152

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    204003b4d9e9ffb608709a59d040dc2a

    SHA1

    5b184cdf82de87cccee3f9ef7fc71d4e30e223f0

    SHA256

    33838fc390e764c9f2fc54c209e5a2d4b331b32bdef8c17044633b25a93fd711

    SHA512

    728a629bf77e20a8201642dfc2447889d95a98b14b5f3cc6c52869537509b205696b6bb7db31579e7bcf85ff64696274b4390563308964a29babba2c4a77d8c1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    78KB

    MD5

    645a445b8614d2c71cef8dfa94443e30

    SHA1

    27a12c688ff040f136ef71ffca33fd81a38a79ee

    SHA256

    efb49e0c0040076d189c629510fdf6f786859aab39c1c28b8994dacb14423d47

    SHA512

    2ea4af54a8fa293306fe34df86bb4b2b8e4a71f99fc9e55850abe75663de04de75807f3fc9129e113a51778c7b5ccf5d61a5a862b64d78da53e6bc5c872a9d9f

  • memory/1152-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1152-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB