Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 19:00

General

  • Target

    ecfa3bffac2002c0707cae9c1e7b5340N.exe

  • Size

    21KB

  • MD5

    ecfa3bffac2002c0707cae9c1e7b5340

  • SHA1

    1a5d4661f5ad35b4a4e812cc1df46c36a6cd973d

  • SHA256

    1153df12688e5fb565b712c8bd95c3d978f9e05cb3704f05517632f39cf046c6

  • SHA512

    ce0afa0774e0776386df1c1918e37281c0a42bb48e80085f96749a35cd9c1e8ddd58fa671cd4c14d248f0988051aad46459677a1b7e44d284672aa4c2eaf2fef

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJblDZblDZy924Su0QK8u2l1QI6924Su0QK8u2l1QIElv:kBT37CPKKdJJBZBZyF/MF/orMalY+

Malware Config

Signatures

  • Renames multiple (3201) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecfa3bffac2002c0707cae9c1e7b5340N.exe
    "C:\Users\Admin\AppData\Local\Temp\ecfa3bffac2002c0707cae9c1e7b5340N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2660163958-4080398480-1122754539-1000\desktop.ini.tmp

    Filesize

    21KB

    MD5

    ef2c65ad74cc4cd78adf6a09f56049a5

    SHA1

    20aa8ee6e8fef91c3ff9ad34aaf16b204956516a

    SHA256

    8d67b4e046e2f11ef052e7abc3fe23648443e93879fdd05188097ab6515c2314

    SHA512

    b2b57a0bed970ee88ae9d816f4d14b36671bff884e92c09a5a24568f9a129c60248c6de9aa1ae9b2cdeb3e9a7bdb7033906ca580b4ee45fff95a8581379f70bf

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    30KB

    MD5

    e4c9898df19518d94c147d26cc3e8161

    SHA1

    63fc3045a6dc330b8279503d2839a29823df1dce

    SHA256

    cb58052bb2c9566e08fc460c23761efb24c8897bcc6cce7f56bdc4d67e408f40

    SHA512

    be110f0dee17bdce5e3625f59947e0af62b86d2670e40953512feb6618afd6832c166d335bbbe4d49cb8c35d992811733be6b9352372695ecf604229eef0bd80

  • memory/1020-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1020-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB