Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 21:15

General

  • Target

    2048fb44555e2ea8622ca163315e8590N.exe

  • Size

    68KB

  • MD5

    2048fb44555e2ea8622ca163315e8590

  • SHA1

    2a6412e977dc5eec2943bd71a036651247d6725c

  • SHA256

    f2ab59a9e3b315ec7a47ead8f1d769fe56abed204df393f4d3577a6fd75e3ae3

  • SHA512

    fda870ad95bf2afce33eb2266b1be0d7dcf8f146a345d7fa7eb8e9a1b18570738947d4282391bbcfb10df1aa62955355512f6ce645700452381051898459f19f

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvJUfWGUfZe/HtT8lNvqe/HtT8lNvO:/7BlpQpARFbhiWbb

Score
9/10

Malware Config

Signatures

  • Renames multiple (4370) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2048fb44555e2ea8622ca163315e8590N.exe
    "C:\Users\Admin\AppData\Local\Temp\2048fb44555e2ea8622ca163315e8590N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:5072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-701583114-2636601053-947405450-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    ca5f37fc62143b8fcd9d72766d69344a

    SHA1

    3b045744fb5a6cd3033f05c0bbcea48c8facb617

    SHA256

    03ad2681228cddebb00fb4e8d4a4fa78dfa052d3d642461e56d0227c57fa194a

    SHA512

    32f15ace1c71da5ae0d7d5b4822f80f05d8c9028eb0c8a6edfed562d1df9676a9b06ce82b185002e2748d01307f44d358a5d93358d0512668e5feea478be92b3

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    167KB

    MD5

    aeec2650af9f36538e449c118a41afa8

    SHA1

    05a2603a80986ad2fe77d36776cb8a0429e0f47c

    SHA256

    19e333789b1e3e6534f226464cf5e6ef61a912053a3da822d179317d828dbffd

    SHA512

    217403ce7e4380e3c9e2c484e0f39bdd805b2e327b53a29f1ef23ef69d8ce81e291deabba471ddb13b3761876eb314861da7aa68d18287c085d8d2a081bab03d

  • memory/5072-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/5072-1794-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB