Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09/06/2024, 00:14

General

  • Target

    5b6c90d4218efbcff1ed4dc63009176540db06d5acd21ee538d8216a162aa3a9.exe

  • Size

    45KB

  • MD5

    963d5f40ecbfb2d8366b9a6add324416

  • SHA1

    0837e1a2ac7476a31a4d059e03dc9514e272b860

  • SHA256

    5b6c90d4218efbcff1ed4dc63009176540db06d5acd21ee538d8216a162aa3a9

  • SHA512

    00b82d08434ed8f7bb701b0933efd7159ed9288c348dd2b52e5e1779fbbc1c0b9ee35d88a9903cb4609059f416d967d98172d8bb0a4e2e4c4d38625b93a944c8

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzb:CTWn1++PJHJXA/OsIZfzc3/Q8zxEU

Score
9/10

Malware Config

Signatures

  • Renames multiple (3786) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b6c90d4218efbcff1ed4dc63009176540db06d5acd21ee538d8216a162aa3a9.exe
    "C:\Users\Admin\AppData\Local\Temp\5b6c90d4218efbcff1ed4dc63009176540db06d5acd21ee538d8216a162aa3a9.exe"
    1⤵
    • Drops file in Program Files directory
    PID:616

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    e199e85f3c40c0dd5c080767994cd5ef

    SHA1

    31de4cd1ded1392cf0be8b8324a69b66050d96e2

    SHA256

    25a7a180f34ed7280771e301ad1bf30f30524c43e039a2810be64c80b72bc7df

    SHA512

    9df87b91787bc903f641802d3fe819ba51fba80f149bfa4e25839faec6622fed341d1ff811674c550890e675b52b4e09887ba1029c8a781bcfa6702444bad7ba

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    caeb6d9706402d5237745683ad991e71

    SHA1

    500d9ea20ca2bb3979d4abefabcfea6f70e45b56

    SHA256

    c4bb4930a30d1c84d88fa48b8c4c269008d7a907689c64b3a7c1368d7ef68203

    SHA512

    b061b5815760a238de5a47b7f0ceceef8395ba5d78945ce6b4c14124f3d43d507092d88789b89046a821fa48fa869f418479f5e56c0b19f193b82969c5542c21

  • memory/616-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/616-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB