Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/08/2024, 04:09

General

  • Target

    f314b0f38469c1cc5742cd613ad3796b7231e6fcf15777bd9849ec57ce60f416.exe

  • Size

    69KB

  • MD5

    c265caa3e7c712a0b9ec5e2c84b7343a

  • SHA1

    9632cb36de06eb8cb48ec23702af9b4ea6524ff0

  • SHA256

    f314b0f38469c1cc5742cd613ad3796b7231e6fcf15777bd9849ec57ce60f416

  • SHA512

    56141ab40af6ef53a17d441a861607e0d886f89a5597eca08e381ffe88626ff74f39c41283ec4e3bf38afc4361bc204ae56a8029ffd9cbe4884bb30a962f1dad

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8Q8/8fCR:enaypQSoskm

Malware Config

Signatures

  • Renames multiple (3560) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f314b0f38469c1cc5742cd613ad3796b7231e6fcf15777bd9849ec57ce60f416.exe
    "C:\Users\Admin\AppData\Local\Temp\f314b0f38469c1cc5742cd613ad3796b7231e6fcf15777bd9849ec57ce60f416.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    ab086b6bb74ed303c0a89749820ca3ef

    SHA1

    08cec82f2cbc00bb28e91cf0bd92bbd42c2299d4

    SHA256

    7ad9253a8bc65a2f0cd28de884c1f486d0741e1f772428c69dfef74e6a34da59

    SHA512

    bf914251989d4f81d3d273c8cfce1983eee3d3e43b6ab2f8dc41646b87a05091858c1eeb55d8a7b761ce74c1ad83f0a701de21fd95d7234de4639d00a8c525a8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    78KB

    MD5

    5027c638bc9dc344bcae5a13855b8412

    SHA1

    1aaa75896e529ce0f661b85e6234fe67e8f23d57

    SHA256

    1ff1d13122ed505ac81b20d6415975f09dbf696c718e0dd2c8ffce1cef583a6a

    SHA512

    f64c7b2da8f78b95255bbca3a13f2059940c2aa9b65661787df221e39785c3b6e74bae710fed102d5de2a7422ab4499ab8807fea4129d916092d9b7876e3635f

  • memory/1208-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1208-654-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB