Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2024, 17:03

General

  • Target

    04889a4f660af65a956cbab1c6a10010N.exe

  • Size

    69KB

  • MD5

    04889a4f660af65a956cbab1c6a10010

  • SHA1

    87e3eb38700370678d5fed2338284ab253ed879d

  • SHA256

    45ccda446707ca8cb2e7ce222c390e8f5bf78014961e5a94c34a8966133f2d82

  • SHA512

    6cb3d8062ecc1fd64e63a22f38a4790035b723355e60052e7bd8a43bba707afd3926634406ae559554ab0e8e2eea333399e4e2fe7a6840878b5be46ff0553b53

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zx+:fnyiQSon

Score
9/10

Malware Config

Signatures

  • Renames multiple (4845) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04889a4f660af65a956cbab1c6a10010N.exe
    "C:\Users\Admin\AppData\Local\Temp\04889a4f660af65a956cbab1c6a10010N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2796

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-701583114-2636601053-947405450-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    e5abb202d4ced0f8b712782506523efc

    SHA1

    b859d78215dd4a50d2251b725de45a4483b58ea6

    SHA256

    2ce99e7eb2d7183641c5686430be075b2d38f034c4ae7aafa9ccc561b9499b4c

    SHA512

    08a4af47237c44057e45af8c4f4e031a8fc5db10510eb0991b73484957bf039b1703dd8b5e2796abadc9110600c7066f2fad30ccc6e7c3779157cc809ef15752

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    168KB

    MD5

    273fb995fd4a4ab302a56c7a8023bb32

    SHA1

    392b7eb859a9964e389a72660cff68f3e2980c01

    SHA256

    6dc2d6f55884f6b307585cd967187a8ae6771203a5beb76047d9a05a2b7cb6af

    SHA512

    b1149969ed96a8714a5bab339a093254803aa1c2f6505ca56d6aa66590cab4552fa18d3a8af68e404a7c6fe6821e54623a58d378413dcf939f3b5b8845e0eaf5

  • memory/2796-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2796-1788-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB