Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/08/2024, 21:31

General

  • Target

    05b2e63270a7455585131b37c92a67e0N.exe

  • Size

    18KB

  • MD5

    05b2e63270a7455585131b37c92a67e0

  • SHA1

    d995f2984549af46434cd8c093114c50f11d49f8

  • SHA256

    690ae32b0d953b3eb797fd83b4f4da452b881d14c5cef94f5f0c2509aacc376b

  • SHA512

    2a9315fada5bed28858a8688132cc049ca7b1bc6c51f6c67e015cc9f57b6dc3e9047e43b8f72ba6305934cea96af0cc2e8f3b85ee935bfa4b8abe4051aa5e364

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJcbQbf1Oti1JGBQOOiQJhAT17eZ:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJ/

Malware Config

Signatures

  • Renames multiple (3271) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\05b2e63270a7455585131b37c92a67e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\05b2e63270a7455585131b37c92a67e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    19KB

    MD5

    211fcb81fdfb4548e04b17aadec923be

    SHA1

    5e68dc7f3885dd527499797be92aed08419c97de

    SHA256

    32295bf6c55bcfc815a2a019f7aa0b56c6ba681c8563cf32c90ca4d093d33646

    SHA512

    fb8784ff59682616fac6575dfafdb5709e3d8d4c691a46255e81bd7d7521292f677ced6c5999a77ad7af70d371796a5c80cb9861be06da90fe35df77a50064f2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    28KB

    MD5

    becc244f4dce059feee4dbac7a329bcf

    SHA1

    7f5009a5058cd2d57c5b7ce28b01b2418ec4a939

    SHA256

    9004ccebd065092e9d3481f677fb91d4445dc63ef17b23f97955e4f58cd933e9

    SHA512

    61e29b19b2641d9227e3005172d66e3b4e80f7407cc7b4f90e3c794f8da7716a6172ae37440e9c761eaebcf88c9436a5652b5e5399ee777c1626ec33a990ad8b

  • memory/2416-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2416-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB