Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 03:55

General

  • Target

    d84075eaabf5a47de7f04211168e8c2a66a489ac06cadc3056fe8cdcf8f45ea8.exe

  • Size

    46KB

  • MD5

    294b4994fd40208f2be818ad15ca2078

  • SHA1

    d7e9c2aa3abd5d551473db5b758d2184feb1ddf2

  • SHA256

    d84075eaabf5a47de7f04211168e8c2a66a489ac06cadc3056fe8cdcf8f45ea8

  • SHA512

    8642d5a61574da26c0c544d5c2fd3808a5e0286f3330f26d37c7e1058ceef2712c1d0a9a88e75c67a8ef07524cae9c9f2bf273bdde43e3adfe522988f7a60d9c

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBxCWi0DZqWOCWV:V7Zf/FAxTWoJJZENTBCV

Malware Config

Signatures

  • Renames multiple (4087) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d84075eaabf5a47de7f04211168e8c2a66a489ac06cadc3056fe8cdcf8f45ea8.exe
    "C:\Users\Admin\AppData\Local\Temp\d84075eaabf5a47de7f04211168e8c2a66a489ac06cadc3056fe8cdcf8f45ea8.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    7667837aa435e77609d5dab48b91efa2

    SHA1

    399b19ec62e70bf5cdfac6f7191b09e774415876

    SHA256

    a97a7c1c7f3d7309680e242eb41b75abc001d259c36f307326f39f2f4d0db7f4

    SHA512

    9258940f1fdc4235a451b70c104084afdb9a630c5ab772b9f265c38fe298e5a0b5bab9df508f7d77a25ecfd6ea903dee410572abcf3b8cb1c351572e2694aca1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    e59f89cab474241713f09d8b96c87cac

    SHA1

    73485055d44f24901d6b2ee40e33ed32046e53a9

    SHA256

    90ec3b6cebf581b3ec49e625b96aa960e23e43cb838fb1027f50d8c025d7cdd9

    SHA512

    e60e606b9feabc18969cf169aa5b55792b90a356efa082928c4259ca854c6e0269044ec3e150af4826197e63355e10a0bfddae3e6d00ca62eae4508e155f5bd1

  • memory/2120-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2120-668-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB