Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 05:08

General

  • Target

    89d31dc2a62e1fa1ab5d9fd2d178a700N.exe

  • Size

    49KB

  • MD5

    89d31dc2a62e1fa1ab5d9fd2d178a700

  • SHA1

    0c014ff52390f2d9feddb850f2d06b7e223e9939

  • SHA256

    a525aedf3c3345a563d20457596e68016cfaf2022210105f932a3ef761ca0e58

  • SHA512

    a644628e6b43bf4c0ca0375881dcbcab8554e6fab286f5f06c7de0244bb5e3d96aec2f98b2742cdbc5f5d2a0481568b54b87012f472be338e46dd3a8df5d063f

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJjtf8WUtf8WvBtclUtcl4:V7Zf/FAxTWoJJ2WjWz

Score
9/10

Malware Config

Signatures

  • Renames multiple (4608) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89d31dc2a62e1fa1ab5d9fd2d178a700N.exe
    "C:\Users\Admin\AppData\Local\Temp\89d31dc2a62e1fa1ab5d9fd2d178a700N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:116

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-701583114-2636601053-947405450-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    69f2d8be280b80553cb3c39bb47431f6

    SHA1

    798fe51e20114ebab108f0900ae3616c567baa79

    SHA256

    c2b504cfe195d05cf1c40b4423f2083e4c09c5efef9d43c9282c7547f9aefa23

    SHA512

    0b148c3568dc770f0795dd4cf78c07424e935fe5806c2577899b7d51cb1feaa5f2e90433adcd71def91e175556a885c9e1a06c79cfcb15cb84dad3c1a4a331ed

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    148KB

    MD5

    e83801157d4c918f38264b82777f883a

    SHA1

    687fd9100b2e57b9702d7ffa28acf57f2281b124

    SHA256

    b6a5792dbd71303eb8474f03970d607f1271b6f417c1973e95f4709970c5d049

    SHA512

    56682e11194d9424a74b351564c3bf81b4c355d19beac6e7cd31c3506ed5482e313d8ab31adc387af3541c370021ba53808f91fe0df922d7738a51dfe584fc38

  • memory/116-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/116-1798-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB