Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 20:59

General

  • Target

    42a893f789e3d13ae11c7f77c8b78efcd0c4d93472e687c6ad47fc0101526190.exe

  • Size

    46KB

  • MD5

    87ce7a73ba16a6ff99ec11b69ea0d89f

  • SHA1

    abd0097fb82f9396fbf0abc5215ebc5745452ff0

  • SHA256

    42a893f789e3d13ae11c7f77c8b78efcd0c4d93472e687c6ad47fc0101526190

  • SHA512

    7788a91464ca040dfc5da662fa16d6fc18e961fb4ed3f94a894a986832b1b92e7f4225a8e3141728497f113f1c4007c0d8388a1a41843fed919289a8e66d61c9

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJXGiXZqVP:V7Zf/FAxTWoJJXUVP

Malware Config

Signatures

  • Renames multiple (3728) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\42a893f789e3d13ae11c7f77c8b78efcd0c4d93472e687c6ad47fc0101526190.exe
    "C:\Users\Admin\AppData\Local\Temp\42a893f789e3d13ae11c7f77c8b78efcd0c4d93472e687c6ad47fc0101526190.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    1cf810d0177efadde947218f37404b96

    SHA1

    d2412aecbf663d2afe31f193b830ee424c84de4c

    SHA256

    2c1d680dd08296eb41e02c365d94d069a72dc3579b9c724f0b894569069f5815

    SHA512

    320b1d84601a5df5318067ae6272b3ce7556368425063a1d521f4c5b4d6cddc15217f7f519626d183b0ceb3a5eadc7196d9611efb5527dd6e87297415314e0c6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    234070b9ce05cdb668189da2af3d3e65

    SHA1

    de390c29ff1658cfac9589d27e32eda2078d801b

    SHA256

    28be736a0864476ca7205ab3b6414a4888f81f18c017d88a98a507f915c580a3

    SHA512

    06876c72ae1d6c71caac8d08459c5c60083a9e5826ef8a8df0f9899104933a6a05d37909f274fcbff5d44143a636d9bf7662d4913eeaf37f6e9476333162d928

  • memory/2728-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2728-646-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB