Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 04:04

General

  • Target

    4717806e05e4c1e4b5d2240df810c2c0N.exe

  • Size

    54KB

  • MD5

    4717806e05e4c1e4b5d2240df810c2c0

  • SHA1

    8e9bcc2421ce626454eb9ef260344ca51bfa5f82

  • SHA256

    b5137a66820115b9d09f8b96e2487a8e4cbd42f073e4a50d32fb0892e350ac5b

  • SHA512

    8ef5015606df9d75a2d6286bb3cfd28ee3593999974ec43b54386c2fc2189cb72e2431e4feda8ed7f9ce067ab2eccbd0bd282677d856180f0d46c4084031b78e

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TTKP2awclvmxaKP2awclvmxF:fny1aP2awclvmxrP2awclvmxF

Malware Config

Signatures

  • Renames multiple (2849) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4717806e05e4c1e4b5d2240df810c2c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4717806e05e4c1e4b5d2240df810c2c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    f30aafe61f312360503fde36a0103a6b

    SHA1

    b9c980f5e656043d8180389a69342ea673870043

    SHA256

    4267035ae7a683d3c7b8ab013316f3654aaccfb796df5b4323e071c382586133

    SHA512

    8bcd366fb87622eb13f99948d68f3fe70a81f944c2083aabe77f54da9e0df076e57bb4c3c32642b2a889df23fde8153b9bf2241c7c043c5d964ebf658343ca59

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    6bfe7dd282722cd092f626f8aeb24bb4

    SHA1

    ed68daf67df5fe90b3c620ec0e6a858af9b894a4

    SHA256

    3607d9029d3add99208632393bc570117681c7f6fc1dcf730c9bd1dd7f5d9fd7

    SHA512

    fe3c893b7d646ffaf31d7b90763b943f22c989787b554bdb586c01bf2a13ba70d3871329f70643c0ccf0e0caa55cce9cbf480c68f8dd651c9a399f04d8e7605e

  • memory/784-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/784-648-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB