Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28/07/2024, 01:26

General

  • Target

    2e2778ec2fadbdfd007b02b56aa15da0N.exe

  • Size

    43KB

  • MD5

    2e2778ec2fadbdfd007b02b56aa15da0

  • SHA1

    0f89243cec220267ba352aa98d2c7c9167e9086e

  • SHA256

    ff116fbae94c68ae259195e1363a7a7112bb5ee00931c6f33b4e81fb46be1a02

  • SHA512

    8c13f1504a0545968fb3440a37ec649e287d2ceac514dafd817fcf47d01e8386d3aab4c05c68238a2562cb5f41e85567f3a8b40814ad50d61615674965659a24

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBk:V7Zf/FAxTWoJJZENTBk

Malware Config

Signatures

  • Renames multiple (1727) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e2778ec2fadbdfd007b02b56aa15da0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2e2778ec2fadbdfd007b02b56aa15da0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    63b7ef450c744b2d491d119422e85633

    SHA1

    09b144c901c9de8f96898dfa94c336b14e3cbf80

    SHA256

    2b7c8ecb4d228faf4a91164200ab676568500421b12eef410234df2c988cd3d7

    SHA512

    3ce824deafea2ae9273f568d28c24e30158e20c0f8107de02d8755c14baef84b02b32342a23e59f0e0a95d34909ba5153c4d2ddcacff9b20c38d0558f2ae7028

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    315034ecb8b9810a93f97c3f3375c84e

    SHA1

    46e7ce2bf8ef3cf2d80f4e3454a8278ab039beac

    SHA256

    67194b52dee62dea5209fa8bab406d8af8919ceba1a52130ec2a85ca57e84f77

    SHA512

    49fc6ecea8e2b81630914691842bc9c277d5b80cdc28fb0ada29886c4b3f400bb27164784d23051c2a0b02aa496299763f7d70b75e9ec0f4b14c47c2e4255a8f

  • memory/2200-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2200-138-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB