Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 00:46

General

  • Target

    2ff6187f419116303ad7ccd08ffad880N.exe

  • Size

    47KB

  • MD5

    2ff6187f419116303ad7ccd08ffad880

  • SHA1

    eb48b01bf22d8df7bc0c45979f6268aa638457cb

  • SHA256

    454e459caa412f0d30f40bfe5db71064443f1219ce5e21e5a5478efe53d1af71

  • SHA512

    f97250de9c8e0411dba6a85e9964c846c48999d9774c07e1a50228278b0381b4ad2a83fb30a031c9cf8e433a022dafaf22e9c5fa79722868f7bc47723942f710

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFhP:CTWn1++PJHJXA/OsIZfzc3/Q8NCurB

Score
9/10

Malware Config

Signatures

  • Renames multiple (3223) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ff6187f419116303ad7ccd08ffad880N.exe
    "C:\Users\Admin\AppData\Local\Temp\2ff6187f419116303ad7ccd08ffad880N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2772

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    d4109c20346165f2cf38bc2f70a36659

    SHA1

    ebe977b6949f6e6f2440222d650d8ca4c4e8b2b7

    SHA256

    7212a8353fd77808fe94737d897b41e01b927d30f208fbb174cbe84787cf8044

    SHA512

    95faa112f5115a7e813ec5ea7f611dea3d49dfd4b2c7a65c7db888d20174ffc30506186e47d99928f826c757cb72174eadfca6857c4b5bdae5f0c1532c40817c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    1e49ffadea3d845ce0f3e7ff727862c9

    SHA1

    e62c428b9e056209cc15dae9d2a05ed4f0d54206

    SHA256

    843cae1d88e076f9b3259292b48aa10f53208e0ebf477c2f61e4cc18a9cae901

    SHA512

    c78dba9a17d3a1b31c6fe337217d080c254399229c612dc858f8044bcb3458d3d2d3048eb4f2e264fd4cd520b6f35158992c445dd97a497ec15fe15cd97fd091

  • memory/2772-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2772-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB