Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 20:08

General

  • Target

    4e02ec3338e9f3ce79d9bf0bf7fbfb40N.exe

  • Size

    57KB

  • MD5

    4e02ec3338e9f3ce79d9bf0bf7fbfb40

  • SHA1

    5096d259d8ed2dc4c1b03e5b4285dee26d7f6f4f

  • SHA256

    07551474a3d5deb5c593e8eb2fa36b69f919e22c43fe7d464c127e30ccf01725

  • SHA512

    c06e86e54f412952eb65d873acb78fc12e1be47bd7695b907a7fd0cffa61d881d7e84f548cad52bda2750a6506b4077843c04778d69e1a024982561ded95d7d8

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2r/:V7Zf/FAxTWdiE

Malware Config

Signatures

  • Renames multiple (2939) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e02ec3338e9f3ce79d9bf0bf7fbfb40N.exe
    "C:\Users\Admin\AppData\Local\Temp\4e02ec3338e9f3ce79d9bf0bf7fbfb40N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1705699165-553239100-4129523827-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    ec01d68b942d9fb18778dd4c15d65178

    SHA1

    2fe788de44c556df04b5cfb67d2cbe2264e61d40

    SHA256

    90d4cdb3a8979ff964cff133a013769185b2990f2da7f4aac2e8a394d12e2b84

    SHA512

    d2a0b18beaef210b8a0a841cef1681b42ab90e5fb340c29b6756165ef04a9b07ae5075957084ce4f68107597b863f18962ab412fbfb88f539715cc19fb35a540

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    156KB

    MD5

    2e7ff4154bcd67f628287c84d13fbd7c

    SHA1

    7b0de25347c03e1c5c3cf70bd26979b4e846111c

    SHA256

    e5f8ca323665c71267d021807faf245b7620e52410890ce0ff02ce61d2e35904

    SHA512

    35721648a1efb0d2ed20d5e303f09a67bfc145e2109beb8b90dfd7178cb2b9403c3b6cf81f57c79b8e0fa330fca7ed79de2fa640ff1405b9dbe3b39ceac065c3

  • memory/1460-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1460-1592-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB