Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 21:37

General

  • Target

    0d6bc0e3cebbc6ef01fba8df907b7000N.exe

  • Size

    65KB

  • MD5

    0d6bc0e3cebbc6ef01fba8df907b7000

  • SHA1

    c2caa834ff03948570638a4f6d22f911a475791a

  • SHA256

    fd82cee7d4d01ca55745e43811ec9a9b25aaca198cb75660f44d9e4cf5050170

  • SHA512

    d5521dfe3a6fae6dcc7ed73fe18f4a0dfda3c05ab6187702aa53af55edf58a223aa2c5443a64add01d3e55cff96e5e421111929ddd3eb21343df364c9be40899

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zxviYiaEI:KQSo4iYiO

Score
9/10

Malware Config

Signatures

  • Renames multiple (3212) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d6bc0e3cebbc6ef01fba8df907b7000N.exe
    "C:\Users\Admin\AppData\Local\Temp\0d6bc0e3cebbc6ef01fba8df907b7000N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2408

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    66KB

    MD5

    9c6efa34c768189e5326fb3d0e974e46

    SHA1

    038bd5ba3b67a963f943cf4e623fd64a3778ff2d

    SHA256

    4e1daa775f9394b918ab8400b17f5ced06dc244a008d78820d2158da8abde9f2

    SHA512

    3a1099d0c8ba5f07fd8c14b185013021a82335b6738bd77e1843d45d52a5a604418b5dec6244858ad4567d2d2c57bb448251bfb3478ab12f6cf4882885b1f654

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    75KB

    MD5

    19df58b9b6b6de6cc69f2f5862b66c17

    SHA1

    7fb7d08652d74ac45ad19312a26d5d7658588d18

    SHA256

    a1ff7716fec406b071f4455052cd7c89d6a014a5d71a98f0dd9d70b5454b5c08

    SHA512

    858a45076cd2e79a415e602457e54b2f9f2f8b5b8f5477a1ae83f4a4aeb6d11063d26811b2f1041fd97445a8ce07431247e45810ec6a97b46bbd8e6405508e71

  • memory/2408-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2408-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB