Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 14:14

General

  • Target

    00bc2ae3ff33fab958077310d5cc3b00N.exe

  • Size

    46KB

  • MD5

    00bc2ae3ff33fab958077310d5cc3b00

  • SHA1

    e569f85ed58e8a660829194a057b8c5ccfa84735

  • SHA256

    d052c0e0373ddc1179bd32fd854e96b914b7fe0fd38f2e2a5148a9dcc8f7241f

  • SHA512

    59c085cd3cf3cbeb5716e21aa95f86fadf1365b690cc3889081998b2e8fef85c7a022f9f83ab2169bd0d49b23ae2a29b24387ea5177f4f3032cf9cd4a124378d

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIo:CTWn1++PJHJXA/OsIZfzc3/Q8IZX0N

Score
9/10

Malware Config

Signatures

  • Renames multiple (3774) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00bc2ae3ff33fab958077310d5cc3b00N.exe
    "C:\Users\Admin\AppData\Local\Temp\00bc2ae3ff33fab958077310d5cc3b00N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1312

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    f9dc2b77699a6238dd39ae89d742d447

    SHA1

    3bf871c2aae2b672508141ceca542b79789af95b

    SHA256

    883de09677f43cc5423b76737d164c4e731127d2b3cc0a73224cb314eb406d44

    SHA512

    1b80a7952e67f6c776edf81616c6170a26abe8a83b33cc4a7110533daf7f016647ea74d90615b8866b1b36e34f5073fd8f6cbffd8e6b78d33a1cb609108d819a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    4196d8c2513d88b7206e5b5107118c0e

    SHA1

    f475a671317e80505be4f6427677bc47b77fa973

    SHA256

    ab2bef5dbddab77490a2eb4f0c51c26bbeaac717bee5e818d3a5f612db6372e7

    SHA512

    d47b55fa2c66a911e5487abdc57e0c2e9bb6a4e4a3aad2aaebb88ed8c349e79c1fbdafefa102e5da6e986fb91b73c7171cc0823d3162c406290696444e176c2b

  • memory/1312-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1312-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB