Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 00:55

General

  • Target

    33d0cf597a0aa322560793d30e453f70N.exe

  • Size

    202KB

  • MD5

    33d0cf597a0aa322560793d30e453f70

  • SHA1

    c74807dbddc5890d02137dabacc9a7852a8f2178

  • SHA256

    445a8acb64146ec6552e1e798d66c462c24bb366dddcddfdcf5f769eac9cdfc8

  • SHA512

    10c5c8f1345a966300b2824b3cd3a1aa192da74a43d39aa69983db546f41cf132cbb25e09223a45a4bd442bc10b626a6f69426316a0c7cd1e6dcab9c60d07912

  • SSDEEP

    3072:fny1bMI9KHpKHDGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2lxGF:K99QpKjShcHUaS

Malware Config

Signatures

  • Renames multiple (2725) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\33d0cf597a0aa322560793d30e453f70N.exe
    "C:\Users\Admin\AppData\Local\Temp\33d0cf597a0aa322560793d30e453f70N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    202KB

    MD5

    998a012b97c7903326dace52126aa8d3

    SHA1

    37e3872997586c94b6ad678d86e35fbd76fc8b81

    SHA256

    b33b73a5d5866e863013206c2eda445228abe2555c68ed905a4ca66ee31b8d7d

    SHA512

    ff3093c62b17762834a2038e02c1b039af358220ab63ff463036c5a38df059e6ab755a6cf46e885ee783c5fd5ea8e829fb85fa3e2d1218dc12b90f8166e55c33

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    211KB

    MD5

    4d3c4288c1f81c5ea293b527fbf5d017

    SHA1

    31e6ee122f74a5340148d40d67420ade03e36129

    SHA256

    f7598f6e0d360df1e37a78f6f706c60be908a84942d40ac2d3fd5707ffd02dac

    SHA512

    d7d4011955c155a8df7aa627b6c443c7c6729ae1c6f0dec03829197b7dc47c1f4ec1762c5a097bba181bdd6ccdeedaa2b61d77ba57c463c949de4b062cea59d6

  • memory/2708-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2708-548-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB