Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 18:48

General

  • Target

    10fff0e8c2e90f2b4385a488d200848a91b01467de330eaed53c0afe77ce44b6.exe

  • Size

    43KB

  • MD5

    878f5d905b378d17294bc856250b288b

  • SHA1

    e87d345e3930df20cc38ffb037ec18c123ef1f77

  • SHA256

    10fff0e8c2e90f2b4385a488d200848a91b01467de330eaed53c0afe77ce44b6

  • SHA512

    d005591c99d095c4171f3706c375fa18adccec6f8c03781f728a9f949c161357cde9baf555bf218f5fc935535e7f73434d98f0c41c1c5c06d707bef8f2516fbf

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdF:CTWUnMdyGdyI

Malware Config

Signatures

  • Renames multiple (5195) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\10fff0e8c2e90f2b4385a488d200848a91b01467de330eaed53c0afe77ce44b6.exe
    "C:\Users\Admin\AppData\Local\Temp\10fff0e8c2e90f2b4385a488d200848a91b01467de330eaed53c0afe77ce44b6.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    9d92e8e12d0fba7c5977fd9e90af6522

    SHA1

    9af8d5d7168dc7d63cecd7106530297cf4b3f8f9

    SHA256

    dd13da9c292a6a9babc0bcb493b03874e0c4c61931eb7e0892677fa08c2ba7fc

    SHA512

    78b9748125a9053c32a2e98d9bb5a76c366c4adacce81fd56d0f6d9da712963c212725cd7944bfd880599a30f721ae712489a698f6676906ac6e075e5ac04578

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    142KB

    MD5

    5bea786e9848305f119555cca79ad89d

    SHA1

    79cfa76565bf9e574b67d68dd3071b1aa0911e61

    SHA256

    72020a30117ceb3646ea82f4841e0f3fbbfc3a15e76276eee8046577bd9c921f

    SHA512

    a220a15c008b0a094420e8f5893e6263821e5ec5266309c0ea32b20bb626b9e7147e62d85cb07865a6de741f8c1e20c43c2a1bf7dca18a7b66706cba4f9d68dc

  • memory/4324-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4324-1198-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB