Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 22:18

General

  • Target

    6097cff5631e773e354d5e532051d358efa4cc72848f6f9f7a64bf3c1116615c.exe

  • Size

    42KB

  • MD5

    69a04a278f11ca13f83f8e3547158c35

  • SHA1

    de14fdaaf5351b151b72bdde68c355dc4243b384

  • SHA256

    6097cff5631e773e354d5e532051d358efa4cc72848f6f9f7a64bf3c1116615c

  • SHA512

    5167dfa07ff7e9ea48ebb58bd15e4f744137e5e1b07e95d25dbfe349410e77a3ae6ecf6d542aa3543a97685e7d565c0bf2e71605f94b026dd4d068258bf2140b

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBR:V7Zf/FAxTWoJJZENTBR

Malware Config

Signatures

  • Renames multiple (3649) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6097cff5631e773e354d5e532051d358efa4cc72848f6f9f7a64bf3c1116615c.exe
    "C:\Users\Admin\AppData\Local\Temp\6097cff5631e773e354d5e532051d358efa4cc72848f6f9f7a64bf3c1116615c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    a71267da4cfa8165e266b9e028f3eb19

    SHA1

    2138a9fe48e5890f827158cc2e5d4941a781bb29

    SHA256

    5df1285579abbebdd7f5a809215a900717ca7a9618e9906304c584a8fdab3de7

    SHA512

    7be76d8acaa42530d1532f353e005aad2a39cc9bbdd0570502f1cb5b620941247c3b4fcdfc6a202dff8e0a4765004807c41c9132186b59902f7bf60ed694042b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    3b78a37026c5745341a1810a82e9243e

    SHA1

    8759d1ed20330fbab6a246184b9fac44a3d27fcf

    SHA256

    8e207ef844a2f7e40eaaf42ef47a4622c4059c5f49a8dab2e86d35f62124156f

    SHA512

    af1cc0eab34b11a741373a6ccbc24f0b1761dc240e3909498f6669652009cb87d771e1521b0001c96af231eabe12ee4f517ec20d97a8056239f522991dc43d1c

  • memory/2764-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2764-652-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB