Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 20:08

General

  • Target

    4e02ec3338e9f3ce79d9bf0bf7fbfb40N.exe

  • Size

    57KB

  • MD5

    4e02ec3338e9f3ce79d9bf0bf7fbfb40

  • SHA1

    5096d259d8ed2dc4c1b03e5b4285dee26d7f6f4f

  • SHA256

    07551474a3d5deb5c593e8eb2fa36b69f919e22c43fe7d464c127e30ccf01725

  • SHA512

    c06e86e54f412952eb65d873acb78fc12e1be47bd7695b907a7fd0cffa61d881d7e84f548cad52bda2750a6506b4077843c04778d69e1a024982561ded95d7d8

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2r/:V7Zf/FAxTWdiE

Malware Config

Signatures

  • Renames multiple (2704) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e02ec3338e9f3ce79d9bf0bf7fbfb40N.exe
    "C:\Users\Admin\AppData\Local\Temp\4e02ec3338e9f3ce79d9bf0bf7fbfb40N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    dd9a81dc024038ea7d8e1ad73a5b4851

    SHA1

    b3566a646a8a40fdb2a3548d40730861b535c3c7

    SHA256

    0bfc6ff9131e3c4eed34d950606e8bcb0c8b87876381d4a384a6fe170441f44c

    SHA512

    fd0fd9cb69e8157bd60acaed877c0a435b86f6989a15acf75625b7bcd278f09a6408285075139aeeb0decb7881c86fdca3d031127139ccb83a29c9775fbafa60

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    ea076638c2ef21d5f843ebb976802828

    SHA1

    794fad78920e9c9e2165d23ceeb98d6a0fbe8b40

    SHA256

    accafc6cb85871630462604f64cc60d7f586be4e0611736f0a79ba7f22ee9445

    SHA512

    9499bbb71d98faedeb629026c7ba3698d688ed42fba448c3b6efa79f4812591f0b218ae19316feb4b67c1c6ddc64872e9565c612568d6c106f4d63c1770b6959

  • memory/1756-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1756-162-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB