Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 00:02

General

  • Target

    5e4942c54938820e643c133bba4bd0028a3c4fe4137e2957a124203831496c05.exe

  • Size

    37KB

  • MD5

    77eed6aabf1d0cc3b1fc7a70ae7d24c4

  • SHA1

    197c35010e719f6f9dc2ec6add890302809375b5

  • SHA256

    5e4942c54938820e643c133bba4bd0028a3c4fe4137e2957a124203831496c05

  • SHA512

    65fd1dbdcb2d45a124ff197a101277f1eaaee5c0354d937c7afbc4af00e94e4dfc87de3c3c1bc456502f96ced5f376831d645126199a843aa70dea9ed8c9d43c

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeKja0u:CTWYja0timmjcVFjVPjc0ja0timmjcVe

Malware Config

Signatures

  • Renames multiple (4033) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e4942c54938820e643c133bba4bd0028a3c4fe4137e2957a124203831496c05.exe
    "C:\Users\Admin\AppData\Local\Temp\5e4942c54938820e643c133bba4bd0028a3c4fe4137e2957a124203831496c05.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    6dd49a7508845d08ea7462414661a87c

    SHA1

    115cf5c762ddeebe2234d1f5e8f413d1756ac5bf

    SHA256

    b48e231ceeeba37c7f48ec19bfec921f18ab4c0cd20e5af2e8e8dceb3f57767e

    SHA512

    fcb931ab21f610363fbb2265d85a7f41f28bf03b8f4610d7503c968556720dfdcb4a27a3a0bebd349284bc492af02e0f3d13fba7a4807f2aad61d9edbdcd5a64

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    46KB

    MD5

    c1647fc0b26ebd653e1b85f73c5b1e04

    SHA1

    6b89fcaa78550a9945edd2a2c0c030b22bd4a3f4

    SHA256

    d0213c18840afb73e5b8bc06d8615ef8a665c1095019c2e12b05344641de9357

    SHA512

    b368bd808912be240b12e6f0eff20730939baa7267a3480e94f833727015e921904faf3aad405b2be515d7e095b4e713ba132e19e19adfc6b7df6919e71fa812

  • memory/3024-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3024-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB