Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 16:23

General

  • Target

    80276ca772d47c3e792f06b1b79541f0N.exe

  • Size

    57KB

  • MD5

    80276ca772d47c3e792f06b1b79541f0

  • SHA1

    afcebb86a302361d82e39616bf8da0c9542535a8

  • SHA256

    cbec52db28b7fc46b046bef4e6e94488d7889c297639432517c976408cff940b

  • SHA512

    bcfa925b246e3c48672a04d45ce346cca11aa91f9f243031ae2f2eeaa20b9b618ef768be02af087fb986803d0dbb48e17cea0129bbd8f491c53b2a558e24cccb

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mdC:V7Zf/FAxTWoJJZENTNyl2Sm0mGnL

Malware Config

Signatures

  • Renames multiple (372) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\80276ca772d47c3e792f06b1b79541f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\80276ca772d47c3e792f06b1b79541f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    70ae6f75637b19667293273e01187f13

    SHA1

    8ae84f44bd96cefbf112d3a571729cf64d44ac22

    SHA256

    ea3f365936fc3a6e62bb7c0333548f34f2c24bba381d37383fb16428a1209aff

    SHA512

    5f090af6a9e814aa607da54e048a30f4af9b5f648cd1b6cfd9c1c97f52d2ccf52b31cbe41cddb756e9a0290e80aea8abe9a46e62497b60e3c2ecfe6546a6ce15

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    67KB

    MD5

    3ea187cd8b0d6fbf6dacabdbe82d0b19

    SHA1

    90e892216db070eed5c13e6d835c3342498bcba9

    SHA256

    a1e423eeceb1736c178f0d971780d66788bb7261ecd7eb05488ea4b1deec2588

    SHA512

    f6c7c503aa0bef4003c77e618b53d9b36d5841d5567eb57f0b52622590147289b2b746f35b3d14c3bf98078dd2a74df9466b57b646ad356a8742c75ba743013c

  • memory/2468-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2468-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB