Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 00:27

General

  • Target

    2ee66cb455f29729daae33b559210cf0N.exe

  • Size

    103KB

  • MD5

    2ee66cb455f29729daae33b559210cf0

  • SHA1

    4e8276839d657bd9fcd7324b970adaed4651749f

  • SHA256

    8d96555efb906e4107d6a29157ab20201b5c84e40816f74a5042e76e2add89be

  • SHA512

    c1dc896e3bb749be8f1e20a82e7f237bce15e732de51a5b2fb1a611df44848f8806911f7f8c05f70c23fff94171215b2af7d184df9d2cf3f2ee4f126eef387c6

  • SSDEEP

    3072:fnyiQSoJUBM+PocOQejPdMRAHAASnnD5D5172HyZU3YF40S5DnumSFDnDHaJP1Bg:KiQSo/8

Malware Config

Signatures

  • Renames multiple (3082) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ee66cb455f29729daae33b559210cf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2ee66cb455f29729daae33b559210cf0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    104KB

    MD5

    cf95a9741050cb68d35a139036e1c87f

    SHA1

    a0cd25637e789ee9df30c66e1b65a02180c659cc

    SHA256

    42c2909048ac1b35d91525b147101a2180f9b91109b5e6e1c62640f84d3bf1dd

    SHA512

    cb3a7e38443c0901595d5cf62e7464599e0ee913e69950bb4f1c83b1e6f7b46e80232506c4d5dbe2e02a5766b9c97d75a284d1abd799cb3e7b3e36c68daee84b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    113KB

    MD5

    8f3b806fcb7d4652e6c68a0ebbb01c84

    SHA1

    e9f80645f09ad4b77d53423ce3afb9d6eba20d8c

    SHA256

    84d61724b43394bd498f133c8a45770e9978e78663e0a8ae61241ce601c5a926

    SHA512

    9d46e3183222681f11e190aad4a4b955a06166b59f6a60b53c48bf54ab91f48b029227c82387f07d0391e4711aa321d058819f96db9f83fb3ec4d838b1ed57ee

  • memory/2408-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2408-656-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB