Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28/07/2024, 01:12

General

  • Target

    2b034e368d7831f0501f70ec25e0b3a0N.exe

  • Size

    46KB

  • MD5

    2b034e368d7831f0501f70ec25e0b3a0

  • SHA1

    84b6b261d9027a22746de25ac9e33f175bc0ee40

  • SHA256

    8c88ace5fd39d30dbc0ffd64a37af392fd5fce4c03dcb2feeae94a04a9a54361

  • SHA512

    44ab12f5c3c502bd39f06a31eee50213bb6cc601aa0fc1a08655d4f744581124fd7b689dfda209bac0feee37b32d3eab8ac5ba2d326e158d4a8f91142276c469

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJBZBZaOAOIB3jM2jMZfL:V7Zf/FAxTWoJJB7LD2I2IZfL

Malware Config

Signatures

  • Renames multiple (2773) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b034e368d7831f0501f70ec25e0b3a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2b034e368d7831f0501f70ec25e0b3a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    2d0c24bfbb2e82e134e32375d7d372e9

    SHA1

    0719b0ea156de264270601fbcfb7011b6e16a45c

    SHA256

    771e07e6cdacd481d2c5031041d44dcec334f9379471a75d78b74e64a1292e23

    SHA512

    d8e27810f67f58925bddfd6ac405c24ca00b3f9dca9422be2d670c1851b8d2f0c09f52221abdf5a48f4518ddd92ab4762ec8a1f2a8007eba1cfb180ccad5c37d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    cb2dc273ab78e2043d0f4a934ca72800

    SHA1

    8977d63361ab3cf4256470775d376f0e84a1fd5d

    SHA256

    0d6a513666771f8a43cc1df828f876d3683e6fe5593c2ba169d161e0f8d40fcf

    SHA512

    7bc7556a7a2df9365b83bff16790153d021d21d82d6574ae8599cb606731a06d1498d10c6d6e93bed52abaeff259497405b8ee647187c83a5ab7907e8ecc3fc5

  • memory/3064-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3064-160-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB