Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 12:55

General

  • Target

    d1d1df7e76e7beaf944fbc5c77b58250N.exe

  • Size

    87KB

  • MD5

    d1d1df7e76e7beaf944fbc5c77b58250

  • SHA1

    92c852b0c5b039c87f27abf78b996977a506cefb

  • SHA256

    76148e45f0715a6846a31c5e63284255e7a12667f3a998dafce77525e7808a6c

  • SHA512

    bf0a45a2684ab6d4349e33920233db2e2cfa8069ea82c40318505f2edfb8c3e4664e0a1f48405cfa2e23b18d3ae8c1fc8bad49fc9efb74ba5b1a9d6f69923876

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zx0Cq/8S/8X:fnyiQSop8i8X

Malware Config

Signatures

  • Renames multiple (2836) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1d1df7e76e7beaf944fbc5c77b58250N.exe
    "C:\Users\Admin\AppData\Local\Temp\d1d1df7e76e7beaf944fbc5c77b58250N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    87KB

    MD5

    dcb4f2f31bc3a48f55293c6cf016865a

    SHA1

    5b35223a76ef23604f9ef0b7700ffffb7eebeb2e

    SHA256

    6d9bd0f2d1367c030137fef7a28a8d21b1827afd8ec40d9348272a75001f24fa

    SHA512

    0eff8125b7914e9e307d9144e78bde5e65b80a524e80d109cd4b3bc546d4650fa84752bc7ca70ac06c456bdd3953daf57983a12a71ad33a861f8e5741cf0ef55

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    96KB

    MD5

    0c861b4abc7a73f32cc959b0027d8c47

    SHA1

    f213f21bd1886a927b3736341dcd6d6bbedeeb1c

    SHA256

    aa5ed96ba146f0c425c8141f39315e00e0f3be723b0b718ed1218eb0877b9f6b

    SHA512

    bf9b36036bdb122df33bbe8e7db6c67051b04f68f5524bf0c10a5047b31bf8c31b01f2a4e1ff22f444a872630ed500f11199fa8f4872cedb1fa86dea9ec6b598

  • memory/1712-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1712-184-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB