Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 14:14

General

  • Target

    00bc2ae3ff33fab958077310d5cc3b00N.exe

  • Size

    46KB

  • MD5

    00bc2ae3ff33fab958077310d5cc3b00

  • SHA1

    e569f85ed58e8a660829194a057b8c5ccfa84735

  • SHA256

    d052c0e0373ddc1179bd32fd854e96b914b7fe0fd38f2e2a5148a9dcc8f7241f

  • SHA512

    59c085cd3cf3cbeb5716e21aa95f86fadf1365b690cc3889081998b2e8fef85c7a022f9f83ab2169bd0d49b23ae2a29b24387ea5177f4f3032cf9cd4a124378d

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIo:CTWn1++PJHJXA/OsIZfzc3/Q8IZX0N

Score
9/10

Malware Config

Signatures

  • Renames multiple (5203) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00bc2ae3ff33fab958077310d5cc3b00N.exe
    "C:\Users\Admin\AppData\Local\Temp\00bc2ae3ff33fab958077310d5cc3b00N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3064

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1403246978-718555486-3105247137-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    0894f379dec99e4b36068f961159acc1

    SHA1

    8bbb4841784ab70dd82860f1114dc0f479ba57aa

    SHA256

    afc029d112faf41f8f18e38aac5bd1a1aee721780070e7eb85b870c6b4fa1e2d

    SHA512

    057fc023d32c80ab3b6f84b40202d45e9a317693de553362c807cfd7bf6be1ac81ed5f12e6af9d3a6cfcb5fbd8a604aea1aad4fb9b678d0403f878bd9745ee04

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    145KB

    MD5

    d592d6583179de815e56b04c180a44fa

    SHA1

    8d3f0e0efeaee536794054dc5e51811e38c5c24d

    SHA256

    124ba44c54337584bb84ddb6f6e5aea07f3def8fde4c255af5af453f9669d8f1

    SHA512

    1629e3a2fed50dbb591899fafad4ada5607b68f751c4d1a2a4bb8ef0421201b0675c6d30cfbd31377b63daf57c84fd3e7720060dd67986f1c503f343b961c16c

  • memory/3064-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3064-1100-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB