Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 07:30

General

  • Target

    6b76a57e1778626b3e13eef62892a670N.exe

  • Size

    21KB

  • MD5

    6b76a57e1778626b3e13eef62892a670

  • SHA1

    ba85be1c8f134597f95d737678f9e6a86611352c

  • SHA256

    1dccdda159c0652f4e26703e8ed4edd376bc39b9fa5283f2b3394dcd6d16ba48

  • SHA512

    1a4c728bed750ff175cf0bd7f2e98ad3c6b5523c3351a141f7038a5a0ffd4a16d7c035d76cededa8323f5542e076a7968a29aee0919865d492df6dd9a5768f45

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJcbQbf1Oti1JGBQOOiQJhAT17IU5c5r:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJV

Malware Config

Signatures

  • Renames multiple (3433) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b76a57e1778626b3e13eef62892a670N.exe
    "C:\Users\Admin\AppData\Local\Temp\6b76a57e1778626b3e13eef62892a670N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    21KB

    MD5

    0fdc52f71ca6a7e132a6a456b07d623c

    SHA1

    8a7ab164158cf68bf76c2eb21815984191cd47a8

    SHA256

    2dbefd8deb1bfd60d607f56cffe1da51b4f1e85a9f35988a9a57b0391ef0739e

    SHA512

    d71c264ee0c4b8d3f8774ac558cc6445d6d05eb43a2a80075713b90a4d6ebf6558bba798aa711cbeb98aa7550ff0df0c75f4f0e41d5f455916d400994d28021d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    30KB

    MD5

    25568014574cd157d921a86adb648da7

    SHA1

    b92b3293ec2152b488725c9a9f7609759c3e210e

    SHA256

    754ebeb388d02e09e0c312abc92f7ed7e20be3aaf5bff1f25f2aa70e7c9bb717

    SHA512

    57faa16f87e1041461d73635ab6ccd0e3f256d61b416f2f2eead32f6ef3c740fbefbaa2ff224c89e94c5dcab07cbcd20e6993ef78b9aa9bf1c98cc50ddf5fc26

  • memory/1872-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1872-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB