Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 05:01

General

  • Target

    567b14738b31d1d464f0ca41cd83fcf0N.exe

  • Size

    66KB

  • MD5

    567b14738b31d1d464f0ca41cd83fcf0

  • SHA1

    60a82401051b33d96cd5695630a048e1919802d9

  • SHA256

    664efa6e886094dbb764aab9d0ed347d875c1bbde8965becec45537393aea4e1

  • SHA512

    35ed93ad91dd26c828f31581202fa9f623a7aa40b9f5dde190f09be2e1966322f26846aa19f4bde255122c42c49bfb306d326bc0d2af4749f2e663f35eba51c9

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zxviYiaE+UpCUpX:KQSo4iYiN

Score
9/10

Malware Config

Signatures

  • Renames multiple (3208) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\567b14738b31d1d464f0ca41cd83fcf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\567b14738b31d1d464f0ca41cd83fcf0N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    67KB

    MD5

    d4881e518b019a41f8b750938657cebd

    SHA1

    355c0785ee43abe1926c8b4c5f8d1707b265d7ad

    SHA256

    d450b04dc23dad65cec27aa5cf5ca6b881e2870ee011cddcbb6894da24f831fc

    SHA512

    002e88d6fed25598fdb4bf7eb2801022ab5197b91327732cb5b28526b4542f5e8f069d39eeec8ab88e5c43bb6a4d40a59c870f0738653f62010dcbd69562f483

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    75KB

    MD5

    e2613765acd730a54141f91daa9a6895

    SHA1

    14c3c6c703b97b7ac759eeea18ddac88e8d6e7c1

    SHA256

    6880de8c38d1174fac1ae85aa4e1fadd1143d534e8a123984b9030c3df452c9f

    SHA512

    05631aaf0cdf7a25b3baa57a42205b5dfc6eff54f5ef0d2f4434b30c682fd4df69be175e1945f838874064362ff2580ac6b5e14f6d373c16e3d05d39b38392d4

  • memory/2468-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2468-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB