Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 22:16

General

  • Target

    60023bcb4cf1899dbb81084ec4cdb480N.exe

  • Size

    85KB

  • MD5

    60023bcb4cf1899dbb81084ec4cdb480

  • SHA1

    8a97f17720dab739ead0c78b42fbaf30bf87b8a2

  • SHA256

    4090afef14f5e010733f4e94a814fc76bc5fb80b4eaf59909a6d3d4fbc63f2e8

  • SHA512

    bbb782dbe3e6d68319855d1fd3ba4eb8a778ea0e7f1760fde05de74f275b693c562e082ddf6a289b5d2c192ef9982192b17b08112c58bee7a826b316962acf7d

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2ry:V7Zf/FAxTWETWMAI

Malware Config

Signatures

  • Renames multiple (2705) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\60023bcb4cf1899dbb81084ec4cdb480N.exe
    "C:\Users\Admin\AppData\Local\Temp\60023bcb4cf1899dbb81084ec4cdb480N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    85KB

    MD5

    a9461799c5ee8730ebaa61f6e46cd66b

    SHA1

    17426ceafe1aa399c6779172b13556d4c6342cc6

    SHA256

    02fe1aa89e89e1acd6e5385dfe3ee4a676028a36dc620c50837d0ed23f2dca7c

    SHA512

    5b05ed9ff4db0498491f1bff293cffc0d8f3223d24488262bbcfba3db920a3a24ad2ae0583d6f869cd8264ac6e7fd6de943114b9773982322816e1d7b9bb2e24

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    94KB

    MD5

    6eb560cfba0cc58858c30fecb96ba13a

    SHA1

    dd3bc78a042b07fe1c74d08aad594f5997de0d59

    SHA256

    243c139c54817f2e10751c48895848abd16f9e3c73babae1a09db15804682546

    SHA512

    f1b7d29c9ee6ad04d70a10f87661db059b0bd51f62d2e0363c73922919c7750c69c8024af0e5712a0efe511bc72f4998dbef0ea6ed56d7bb9242834755866683

  • memory/1972-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1972-162-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB