Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 00:00

General

  • Target

    189658b1ca85a7dc8c61b9ca4be70010N.exe

  • Size

    45KB

  • MD5

    189658b1ca85a7dc8c61b9ca4be70010

  • SHA1

    147a79c84fef5bc7278d1228578f7953ee38c3da

  • SHA256

    9e21b081b53434ef8a105e785f59fd4693eee53a5e1cc6e17437a3f94df61b47

  • SHA512

    a079cf5a726f124d1b2efc5b61fb1210711681a4bd4d65cc3845d9948890f504e9b8aecd0a5926e89b7bf4297c0482425d0d699041e7839914c41ea62b859c5e

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFI7:CTWn1++PJHJXA/OsIZfzc3/Q8IZ9

Score
9/10

Malware Config

Signatures

  • Renames multiple (3305) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\189658b1ca85a7dc8c61b9ca4be70010N.exe
    "C:\Users\Admin\AppData\Local\Temp\189658b1ca85a7dc8c61b9ca4be70010N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2160

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    ef1480863bfd4747d4786fcd4c8521e6

    SHA1

    0adb58ae870292b9cdd5884cc91c4d4b97775a4f

    SHA256

    10bca3cdc7068150b613d94e972366aa727a3afae702c9458f96f82aa87e3c36

    SHA512

    804e956749c5836a12be3045cd9d244bcea7bcb87ce9a4bc19baff2f5238a3bdb7daa00d06aa3eabc020934b30571ac608a947d6b9498b4c0bd947441eb58835

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    b127097aaa5f2c13777ee38af8a5afd5

    SHA1

    261e4f0a4c8bd0d3787664c6e6ce2da32e1174cc

    SHA256

    5c4a9f655510f366b14581ffac2f6363778d0e9529e1aa83e489a32356be816a

    SHA512

    9aaf27d55ce63e680a681d424e2dbc1c8ae5efa9f65865b2b4364209316aa45ff3237fadf20fc1ae2f1e94ab25109c76f9316415c0a6a8bd66c5b480e54f4b8a

  • memory/2160-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2160-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB