Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 22:06

General

  • Target

    61870d19021059fc994233c99859da8971ca3b4bdbc26257f52f40e4f19ef0a2.exe

  • Size

    51KB

  • MD5

    bfad72007be26a360d87032d81965c08

  • SHA1

    a0b5b028dc27a3d7af6d6c86ff72960e42d28ce3

  • SHA256

    61870d19021059fc994233c99859da8971ca3b4bdbc26257f52f40e4f19ef0a2

  • SHA512

    6e994130b190238af8f525ed4eb2e6216a919f77a71c7b5c6d1f70af5a2fc5284812514b72e09f400a93c74c1acb0c4983742d2a8e1170113cdadaa68ac0d1c5

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mIb:V7Zf/FAxTWoJJZENTNyl2Sm0mI

Malware Config

Signatures

  • Renames multiple (3755) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\61870d19021059fc994233c99859da8971ca3b4bdbc26257f52f40e4f19ef0a2.exe
    "C:\Users\Admin\AppData\Local\Temp\61870d19021059fc994233c99859da8971ca3b4bdbc26257f52f40e4f19ef0a2.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    c350598fe4545d0b6b519298b119ef6e

    SHA1

    b40654c9ef46a25597f606701a00dd92ef47992b

    SHA256

    c3918b5292cec4719cd9ee9ab66dce00cc94c533c8443b43351518fa15a59dfc

    SHA512

    20719b773a5a8771e9893a51ab85c82f03b70a0d458d7bd12c4cf6d460a9ae5ac835864e5875f49c3603d80bde2c4c92f9f6d001b6801d76d62af00cba044cca

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    8e4f35767c13d215bebab63f2ea27d4c

    SHA1

    6fe8529a7e0d1515a6c3702cd9fc015bcf3f2de7

    SHA256

    34f5bd462a2b2e0ac2182322a3d8599348f589c53e00bef4216649e2e6f0b984

    SHA512

    47c2baac78002d4efcbaad7c387b8d6fe5c377aa0f075b4a2cf2a49641e377f63a2692eb19022da610f6e2e39a56e283e1a08b609dc0c61b84795dbf316281de

  • memory/2568-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2568-652-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB