Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 11:17

General

  • Target

    bbfdb18691ee1ae51b1c0c717910b830N.exe

  • Size

    73KB

  • MD5

    bbfdb18691ee1ae51b1c0c717910b830

  • SHA1

    088861bfc3256a858bd90ad7493ed437271ef9b7

  • SHA256

    e5126287a1c716d6952e5caed96327ab47bddb93b9ea9e3bf9d578673768cb81

  • SHA512

    4bff83fe3a7b3b5fdd875f57bb38ba6f42c15281bfdf46101eedd00040a81e03e2e1ed7f728bde88bcb8149c90170a19d8d3baa817497ec24cc7dc1e3e3fdca2

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxxD2Q:fnyiQSoxQ

Malware Config

Signatures

  • Renames multiple (1705) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbfdb18691ee1ae51b1c0c717910b830N.exe
    "C:\Users\Admin\AppData\Local\Temp\bbfdb18691ee1ae51b1c0c717910b830N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    73KB

    MD5

    4613cfb787fd0eb6d9292adbd71f4d6d

    SHA1

    ba412e22f762aeb261cdfca7ebc5e4849ec4ef7e

    SHA256

    39b9ab482212fcdb17607fa64c7c582b74fa8c06804a06f18e0e3b47422559a3

    SHA512

    d88ff039ded602d7d7eab00e4ef45715c5cf1d047d5059b410351e31c8fa7a374a19628e652ffa0b096311481601d5da9db7ef2b9e1c063aa60a52479fb57df9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    82KB

    MD5

    5b4f9007f0632155003c1c2f63524e08

    SHA1

    167961dbc900caf9a1eaf87f22432bbcd5dcc779

    SHA256

    cc2e9722591a2ebbdc2cb5ce6b3a39bec1a30ad62d3d0f1e808ea2f476e01151

    SHA512

    b610e4f24189a202467438553a86ffb75500cf4443c1637c2dd14e585d5d6fbea1061285e6cae96405a63cf47afc3f561f357b2719796aec968f6058402230dc

  • memory/1832-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1832-126-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB