Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 00:00

General

  • Target

    189658b1ca85a7dc8c61b9ca4be70010N.exe

  • Size

    45KB

  • MD5

    189658b1ca85a7dc8c61b9ca4be70010

  • SHA1

    147a79c84fef5bc7278d1228578f7953ee38c3da

  • SHA256

    9e21b081b53434ef8a105e785f59fd4693eee53a5e1cc6e17437a3f94df61b47

  • SHA512

    a079cf5a726f124d1b2efc5b61fb1210711681a4bd4d65cc3845d9948890f504e9b8aecd0a5926e89b7bf4297c0482425d0d699041e7839914c41ea62b859c5e

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFI7:CTWn1++PJHJXA/OsIZfzc3/Q8IZ9

Score
9/10

Malware Config

Signatures

  • Renames multiple (4653) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\189658b1ca85a7dc8c61b9ca4be70010N.exe
    "C:\Users\Admin\AppData\Local\Temp\189658b1ca85a7dc8c61b9ca4be70010N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4192

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-464762018-485119342-1613148473-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    c48f15c9f78b192181a081ec4e8b6f9c

    SHA1

    c5736d26bbb7d8503d145ff36568bcd6c172232b

    SHA256

    007a2cbb78afc6d0b21d5eef402719c6dada73f71f0944738a8b94c298a4967b

    SHA512

    8e9ab07201d97460e129127709a6f2c8f81574db07de8d2c7c3073dbb2718299c4971fb1f5cfb4f331150d60aad9587f37303a701f4a0ea5cd39b5ec9cd76a74

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    144KB

    MD5

    50480d1b2a91872fb440ab2066a8f2e2

    SHA1

    15b9fc5d42ccd2fe36050db8d102790bb8ed9915

    SHA256

    32d66bfccc3470f423ec33d6ef605adf0dd4cd91cdd7e7aede587ce516f6b055

    SHA512

    b60f97bde234dca52cbc5c18a24014b98262af1d637cde56f7e71329533a6599c3664923fa2241dee0740e2aa365286fb8d011008ff9f459ff296b4af30a93ff

  • memory/4192-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4192-1108-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB