Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 18:48

General

  • Target

    10fff0e8c2e90f2b4385a488d200848a91b01467de330eaed53c0afe77ce44b6.exe

  • Size

    43KB

  • MD5

    878f5d905b378d17294bc856250b288b

  • SHA1

    e87d345e3930df20cc38ffb037ec18c123ef1f77

  • SHA256

    10fff0e8c2e90f2b4385a488d200848a91b01467de330eaed53c0afe77ce44b6

  • SHA512

    d005591c99d095c4171f3706c375fa18adccec6f8c03781f728a9f949c161357cde9baf555bf218f5fc935535e7f73434d98f0c41c1c5c06d707bef8f2516fbf

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdF:CTWUnMdyGdyI

Malware Config

Signatures

  • Renames multiple (3782) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\10fff0e8c2e90f2b4385a488d200848a91b01467de330eaed53c0afe77ce44b6.exe
    "C:\Users\Admin\AppData\Local\Temp\10fff0e8c2e90f2b4385a488d200848a91b01467de330eaed53c0afe77ce44b6.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    37dc86d8d132af75cd0500e617e316b1

    SHA1

    5095899fa1ea64110c9f64bc537cd15b1c5fb8c8

    SHA256

    11fcc86ae319a9ebb33d6d0fd54706be21047a4cd96e2d3728754c9511a8c0d4

    SHA512

    deefd312c256af44088e0103f614b21a1273eab2447ad8ddf140bbd1776032c6c4c110600986443187ac6e853f7d457fd3969daa4fd27368a7665064402b4ba2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    0b8b948427329a848015f0933902269c

    SHA1

    6470f5fee3e205703c50562003e337b6ae8edd2d

    SHA256

    bb8cda332a287dc4fe4c23a26885908fca4c924af6dfa2a238f0d40dca7e1207

    SHA512

    14ab211eeca1128c78f1eced5c9c2ab59e36b694e4456d0623793074e9fd917d59a2483bea9c8beef5590c923f44ed855176c683898cafe4a5f0a545a4b3b069

  • memory/2968-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2968-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB