Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 02:55

General

  • Target

    5ec2d0e98395a0cf150fa0e483996710N.exe

  • Size

    54KB

  • MD5

    5ec2d0e98395a0cf150fa0e483996710

  • SHA1

    de41feea2bd5b287b6680e99835b06e7385ab838

  • SHA256

    e70a58f71129ce41a2b73f7411cda3dc39e6175647439efe17e5d2875c243e9b

  • SHA512

    afd2f469cf1460796da445ebce7509087c553149cbcb25fd5a71c9dfd5904177b157e9f2397a1a524d72bda401f88ec68c783c21a5043337ea1c042122fd3061

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rq:V7Zf/FAxTWgGpGv

Malware Config

Signatures

  • Renames multiple (2945) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ec2d0e98395a0cf150fa0e483996710N.exe
    "C:\Users\Admin\AppData\Local\Temp\5ec2d0e98395a0cf150fa0e483996710N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    59882807eebff3885e4f04d0466834dc

    SHA1

    decb1a855e41c880e12ce479aff823b1290f1163

    SHA256

    9d507f77ad8be1ba3dfdefc3dcf5747ee3150015176ae87936c0aa8e1a2bd388

    SHA512

    9a2c7265348926fe23afa57e258bf907a470aa8766b6c7deda05a37160e6534df64af482d60228cd017c3271f5a644c9d41806d2fa6b8e668e15912d0191d07f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    ff1e64925c0af810cbb4285d64e07ef1

    SHA1

    b9a12b5e5896b6bff0df7d31f609ba0623900a0e

    SHA256

    16b5450ebd836b63205b3fe28283b16ee3af8cc821fd0472316cee29318d12e1

    SHA512

    88d46cd55ea35e5d1f977b8a01c148be0bb9d88834657cc28630b92efd520c15a5bc4fe1d02a3aea85bde9ba0829f84ab1f0f290f3ed4eeea2d2e65a1040d682

  • memory/3024-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3024-508-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB