Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 00:43

General

  • Target

    9fe81049a5c2133956442a7d503d5da59914d470441d60d1b061160325471931.exe

  • Size

    58KB

  • MD5

    13024cf0c84b1297a65252a7129485a8

  • SHA1

    9a6488e1cd73c11b31b4b8d23e8f62b00ade9697

  • SHA256

    9fe81049a5c2133956442a7d503d5da59914d470441d60d1b061160325471931

  • SHA512

    2d05b202f55c97b6b37bb772c74000714291e290a5f1bd7a8799da259b9098493c85a04a0662b66575f7b490d14606042b7eaa23dd3f864d32148d5c6fdeeb1b

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8NCuXYRY5I2I4pe:KQSoDuXuv35

Malware Config

Signatures

  • Renames multiple (3729) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fe81049a5c2133956442a7d503d5da59914d470441d60d1b061160325471931.exe
    "C:\Users\Admin\AppData\Local\Temp\9fe81049a5c2133956442a7d503d5da59914d470441d60d1b061160325471931.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    7d8630f7834f4bf03d78eb8d39b75957

    SHA1

    441dbd1a6a0b90b09b564e1d63c5564c541aac23

    SHA256

    ff1521d83caec9607b70df67952ce954b843bc921c31416158433acec2b07775

    SHA512

    36ae033f240e4c92ecf9c1cf2ed9d9cd6c7860a9d5e29ced9fbaf21bae5c7a327af8acbaad2bc7605ebbc7e0c88d21ef26cd7fb2b9275cdf2edab75a4fdfd9b5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    67KB

    MD5

    0dac3fd982f5e6c555d3fed5994c54bc

    SHA1

    d099341fdf4b497a75f16d56454fd490659cadbc

    SHA256

    2b3fe941b40e90ccbb57226b4d584a6f4d47af60d96f788dfbd2b3f133af5bb3

    SHA512

    09b07d7803029e95d59023ac34241b970990a7659585caa1add867c6c068172b596bdd9ead1c5b6ac724fa8cb7b48d1bc6271e3779a0cdadd7b4f1d2b2c0e030

  • memory/2348-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2348-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB