Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 22:20

General

  • Target

    1637f28850c46d5ab8187d6391e078e0N.exe

  • Size

    56KB

  • MD5

    1637f28850c46d5ab8187d6391e078e0

  • SHA1

    0147ce5f0ec50647549d5ee3c5b032f605d185a8

  • SHA256

    7d332c97c0e41a98f7938aa7d3c51b61d338071bf8258af1f8e86d910e0fd3d7

  • SHA512

    4c7756dd8c48dcaa0d30fdbe352ce78513eca81571ebd5f51bcbb307c2f11e5b97867c5b816e522f032b18b928e0e08732f5d22b1bd55c9c34ba0303b415bd8f

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rz:V7Zf/FAxTWtn/

Malware Config

Signatures

  • Renames multiple (4672) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1637f28850c46d5ab8187d6391e078e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\1637f28850c46d5ab8187d6391e078e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    c9341932517c1339ddc3410c70f965bf

    SHA1

    891602645846222fb2cbb494c862fd8860f61a10

    SHA256

    965a69a7ca5c0439ace1db5e1312897cbcb10e7c244c42c533756d16dcfeaff7

    SHA512

    779fe7c2386531be72af11763277db8f4400db14c47a21546ebb28301c77140d6c9b630b84723addb51e3fa73a671e5b7d3607a53d2464297da333703f6de3b4

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    155KB

    MD5

    b67c5551236a240e392786e1e0057e6a

    SHA1

    03ee3550baa49d64176531f0897dd1c880c0633d

    SHA256

    f332ff09730f66b38154140fba6a8ae1029c95406ba1770d8c69285c82681e83

    SHA512

    7c7f1d0e81d4bfc0bfddb0f5801f3252e28ef4aab09c8118ee83e06921ab9e768025a33754120cb43df6dea4f844163383e38e3e99d23f4f7e9858df8b662070

  • memory/1012-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1012-1978-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB