Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 21:42

General

  • Target

    528161067dac7f449eed3ade565dae71f7cfdcae7ab7b7acc567ae303e3ec452.exe

  • Size

    48KB

  • MD5

    c4b156e115968b61520e414e8f633ec2

  • SHA1

    6f38df32d427aa77b7e8e8ac9ff1a15edd7018c4

  • SHA256

    528161067dac7f449eed3ade565dae71f7cfdcae7ab7b7acc567ae303e3ec452

  • SHA512

    eecdd1d426f7ef1e2a49d67a562b79fe83764c667c13ffbb34abe3019ae30ef1c61a1893017f54fe4733d23f37c1037699af99b9fac25d9fa1f58c1cc065e24b

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJBZBZaOAOIB3jM2jMHsLzwzg:V7Zf/FAxTWoJJB7LD2I2IHsLM0

Malware Config

Signatures

  • Renames multiple (3840) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\528161067dac7f449eed3ade565dae71f7cfdcae7ab7b7acc567ae303e3ec452.exe
    "C:\Users\Admin\AppData\Local\Temp\528161067dac7f449eed3ade565dae71f7cfdcae7ab7b7acc567ae303e3ec452.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    04b88fcc9f9db72fa6cf24eba78c5d13

    SHA1

    8e5954f36c4d718e40d58dd43fedfb65cc9458e7

    SHA256

    cd73c8bdf3fb30c68e2474b13ad4a2101f7233f57124bdfc3f49df76998a8208

    SHA512

    c24a556364c133e6d76b445cc833e1b658db3df40221b9d126e183ffdc482f65605d9da3bf7f34d593e1d159da4b85babfb034681c0866d653f4144684fdb323

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    dc7947caf3fb3d386c62f111b87e995a

    SHA1

    439951e3d83e68d6a7f28e631d85c9cc3479a99e

    SHA256

    22866a6b6d9334f32a9412135602cb9ef60fdbea17a3f4e8ea83819609cb685e

    SHA512

    9b222ee7ec84174f2172aada2b77c68eb48edb670077ba14949626e6bdb84376153a1c87cc730fcacc8965ff9cd98e2aaf1b3bbdfe370a95c2dc70a5b156fe9a

  • memory/1472-3-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB