Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    30/06/2024, 22:05

General

  • Target

    608829dce933fbb775d60a92a5762f645ebbc253099e641c534c18230b137ad5.exe

  • Size

    66KB

  • MD5

    cec14728484a44f946f56a5d3986863d

  • SHA1

    9282b74991d58bf34c0a80a275b41735085280ac

  • SHA256

    608829dce933fbb775d60a92a5762f645ebbc253099e641c534c18230b137ad5

  • SHA512

    2bbffef5848b3b307e0e132d24674af5362f88f772fa69e28abefc957b51dc48de92994ece95ed4edbbfea601e9bae81ef1e3287d26ae4c77cd29d47cce6be5f

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwABT37CPKKdJJxdPO9Ot6K/K2/R:V7Zf/FAxTWoJJ0TW7JJQOEK/Ka

Score
9/10

Malware Config

Signatures

  • Renames multiple (3099) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX dump on OEP (original entry point) 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\608829dce933fbb775d60a92a5762f645ebbc253099e641c534c18230b137ad5.exe
    "C:\Users\Admin\AppData\Local\Temp\608829dce933fbb775d60a92a5762f645ebbc253099e641c534c18230b137ad5.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2924

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1340930862-1405011213-2821322012-1000\desktop.ini.tmp

    Filesize

    66KB

    MD5

    bc943240841f610bb51782b9f7735f88

    SHA1

    06063e596953e8ca8f34fd9134342a5f89383580

    SHA256

    67972c3efec746a51ba7050f691adb5adda70d1e0f476a6aa1984e1b4f17f7ea

    SHA512

    9cbb3da81b1d2067f6b5f125bf0c085e1af871db64e9f8ac818d71ec9f779cee1c92152a06f862a2aa5b213c92b91399f0074521acbe64a229e929496a8b1364

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    75KB

    MD5

    35c3250e66223d4a8a95dde55aa44ed2

    SHA1

    ca3f9da96cc61f885fc1d32ed9d15fe57daaa02e

    SHA256

    6a21723e611acd1fb7f331ec82c91641cba19bdc8f402fc6c25b1dd58e9b64df

    SHA512

    f1989a02d463b5a8525f3fe3d31804482e3440ab8d06bf1a214934a75648abf785015727e1d72e850aee142e7505266a4a2579f3de4e440638caf4c1735d8cf7

  • memory/2924-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2924-162-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB