Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 03:01

General

  • Target

    c9e6d0126551c606c7b1d851d67bf639e19cc7f778077cdc328893e7c65c1ae7.exe

  • Size

    56KB

  • MD5

    5d3fed6aec1e0d083f4ae26fa69a63e5

  • SHA1

    bf1a3a1f45fdc91dd09c2a741bc77bcc008d14ca

  • SHA256

    c9e6d0126551c606c7b1d851d67bf639e19cc7f778077cdc328893e7c65c1ae7

  • SHA512

    19bb562404c39b62d120c99bd168418a1ca5bf5a6f9e0b40b73975d608414f0603f323ea4c51b974eae45eb8226a9032f76183becb83a0f9124896748077d4d4

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rR:V7Zf/FAxTWgGpGPwL

Malware Config

Signatures

  • Renames multiple (3745) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9e6d0126551c606c7b1d851d67bf639e19cc7f778077cdc328893e7c65c1ae7.exe
    "C:\Users\Admin\AppData\Local\Temp\c9e6d0126551c606c7b1d851d67bf639e19cc7f778077cdc328893e7c65c1ae7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    6474a64590b22f4fd642faa9e9ac4ef7

    SHA1

    f7e37b5b6978d58ae6501544446901054b3c53a7

    SHA256

    fd7b5feaa05d57ea1275265e808202daca34d2345677d32c46b1101212c29ca6

    SHA512

    2d9b9c66175a17afef9e004eb6979617e58181361fbfde8108ef6b9d629f352e8b450db71a2badd55c2c670aa1a500224a31c2107b07cdde3878e1ee0517e7b8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    d95b558d579dc03c3d76bb2f2ae4b609

    SHA1

    53caf5a4df09e6ded919cef744ea7414a4961381

    SHA256

    8399ba1ec1d4bcb778f2d99cc4a2935a0fd067c3a30c021fde9f7b9e965818cd

    SHA512

    3bd4e58348ac602b266ef3e15413ecfd0e07ddd0ff502fcb809d79900ed7b69769839cae59caa86f62fc6e457fbb706dac2982e7e14ca0211e88c66019cad120

  • memory/2740-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2740-646-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB