Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 02:20

General

  • Target

    c96f9eb7ab53db8c4814420f65874a1a48a0c7580120d7442d0f774e30818214.exe

  • Size

    111KB

  • MD5

    774ecb74cee5d2341ddb8254927292ae

  • SHA1

    d6a269836cf440486411ce94ccff7e20e7517f4e

  • SHA256

    c96f9eb7ab53db8c4814420f65874a1a48a0c7580120d7442d0f774e30818214

  • SHA512

    9e9c560463d6717b3cd2f72b7bf23de6ff950f6f25e85553f60833177a5e06cf014079613df8623780d116278cf0a65a7ae86bba3d547d72b79172c0447a77ea

  • SSDEEP

    1536:V7Zf/FAxTWtnMdyGdy4AnAFTWUnMdyGdy4AnA6mI:fnyGnpAbnpAQ

Malware Config

Signatures

  • Renames multiple (3473) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c96f9eb7ab53db8c4814420f65874a1a48a0c7580120d7442d0f774e30818214.exe
    "C:\Users\Admin\AppData\Local\Temp\c96f9eb7ab53db8c4814420f65874a1a48a0c7580120d7442d0f774e30818214.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    111KB

    MD5

    e34034ba17ec22bb517db383e211f8eb

    SHA1

    9a81d1e43b1f6c54f6c142dba77900fc6b33d1a9

    SHA256

    4cab92b16ac8c58b9eca152a933222bccfde2324554a1b09edc1582c17a05939

    SHA512

    588c6b9110a796a55938465f5da072a87c6a0b3b186206ffad7a5cff2ab366d27de5533b4552a05dfeb8788e950aecd8ae187484d16f20cca6697aa99c0976e9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    120KB

    MD5

    0bcffbe1eeaa1aed3c28d31862d05083

    SHA1

    68d14db5e5da679e9e2d3604b8423b992300d468

    SHA256

    b546ebc03b5f305fa74f53d49e8cb4189f5da03d98a2c2322e5035ccbf3887f1

    SHA512

    ccc1cfa9f007edd24482492f1c43f180f52efb35618c23e73d92487db07b62efaa7de8357bd76f78256cf2252da1a51fbaafb5f4e1ab79c259f70e7d02c606a5

  • memory/2168-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2168-652-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB