Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 02:58

General

  • Target

    d7c93bbee458894056868d7f153408ba638a6a201b694fd5d8663c80b4d30d13.exe

  • Size

    39KB

  • MD5

    a0de491d1618276340b33368937d27b7

  • SHA1

    36ed3d0729c93746fffbc8e68cc4855146cd4157

  • SHA256

    d7c93bbee458894056868d7f153408ba638a6a201b694fd5d8663c80b4d30d13

  • SHA512

    82dc6bfb5e0eeaebda82bbf83d72160036956e93f284cb5cf0dbda98c874e629445cfed0eff1d040089e663a9cf29eca8b75145512c4d29cd5c6494cad1be5d8

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti4AW:CTW7JJ7TTQoQ4

Malware Config

Signatures

  • Renames multiple (3858) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7c93bbee458894056868d7f153408ba638a6a201b694fd5d8663c80b4d30d13.exe
    "C:\Users\Admin\AppData\Local\Temp\d7c93bbee458894056868d7f153408ba638a6a201b694fd5d8663c80b4d30d13.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    d25e4de4ebb883d4b4403e69b0017ed4

    SHA1

    ff3cecc70ec85faac9bb638f5c679ba90173d831

    SHA256

    781dc83a8f5dc527b3f15ed57c218e0f9cef72d2bc9e8ddab1de892e411c318b

    SHA512

    8139f19b5f4eacec4c8b2ef14a74caafddd6e53bcdaf306806db2e028854584e7542559272d189de8c3027b068b9ceab67868bb01b3376b1432d42e7562f4af1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    663db5d1d660963890d2fb3939fd80f8

    SHA1

    66fd7581fdbb6a04d30f77e40acc4e16d7dd9099

    SHA256

    596e7e87772861a4859fb9075bf114121148af30274c52155eda5f330a3e77c3

    SHA512

    c37544479049dd35ee84790152b90bbc5401887569cf85aa094a94d500e9493dc8ab79f7854173ce6113acb7fd39c774d2fd1d54549bc732f17933dc28b37381

  • memory/2420-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2420-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB