Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 07:16

General

  • Target

    659a0cb06caf03bf06d405aeddb92980N.exe

  • Size

    46KB

  • MD5

    659a0cb06caf03bf06d405aeddb92980

  • SHA1

    e948ee1f1a7c3081aebd329e189160ab11e35327

  • SHA256

    263c25017442f65169d3afe9a0b3dfd492d1a42ce4e223caacb1176ee5cb2bff

  • SHA512

    4593ffaa696c5fa4d209963caacf7c8886be8716b8cc8b9008e88e9ec787b3b888d29b73b7e8cf671bac568f87dcf883f8e331f3bfe2702038f5b0bb85caa403

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzW:CTWn1++PJHJXA/OsIZfzc3/Q8zxk

Score
9/10

Malware Config

Signatures

  • Renames multiple (3283) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\659a0cb06caf03bf06d405aeddb92980N.exe
    "C:\Users\Admin\AppData\Local\Temp\659a0cb06caf03bf06d405aeddb92980N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2696

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2660163958-4080398480-1122754539-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    45b54993a929a011ee1e2f640423aa08

    SHA1

    ddfb54398adb033957f1237a0f4ff56b196f57da

    SHA256

    def4de203d8ff770a735d585006249f6a24896338a0a629ec58cf50bbff02110

    SHA512

    dc176aa7ba7e57eb98246f4ed80daf0c2dd2b56daadd85a7943f5f24352302728d5fbb0ac1a2078c59c9a357a21ed87db928faa91c75a98ab426b64a9f6f4a89

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    6124ced41f6ccee5e02eacd18425c84b

    SHA1

    d6a956576bee655081a8779d6cdd6b357007229d

    SHA256

    547c1cf140f295b18cbaf52eb0fdb5186967e86afaa0ef5a12b222240f7471a4

    SHA512

    ec6e5f1f6a4b8e23d226468c69068ce9c2dd87a58b8d02145ca0da641ce10dffec9543ea7da1e4d062a26ab16e01595ee7d8265170ac4c8b21ca5726d0613ece

  • memory/2696-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2696-80-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB