Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 10:55

General

  • Target

    6a50569bd640492ec588bb566d23f960N.exe

  • Size

    56KB

  • MD5

    6a50569bd640492ec588bb566d23f960

  • SHA1

    3a28c8111d5fd22b5d75eb74b7fea20859677e8d

  • SHA256

    efa7bddf1cb3886c81de4b04c0a72d7727636245e0f86bdde1085d1e149e85bb

  • SHA512

    44f81f4b7647abf4ff13df96b1d9427844b6f1eaa296a820451f099c38e259b0a5eab1352d054ed1725906ea6166c26c4c3521089c44e64c1254c15a539e9212

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKXIRUIc:V7Zf/FAxTWoJJZENTNyoKIK5

Malware Config

Signatures

  • Renames multiple (3331) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a50569bd640492ec588bb566d23f960N.exe
    "C:\Users\Admin\AppData\Local\Temp\6a50569bd640492ec588bb566d23f960N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    dbfa0c67862e2ba98d918a1c197b8720

    SHA1

    3bd4bd106f034fd1c97b8db6d2e425c93c743344

    SHA256

    202201b9f0f11c49163d1165a2e1b61820ba28fce380e7ab69814c4705b338f9

    SHA512

    7dd0bf29073a2b9a7e3e6ad650fab69289ff5f731c6c2a4c0091695d9ec2bf7d7f93e1dd8944a013bbb33d4ade1bf4d9c2e8836b06118d222b062a89fcf2d5f3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    437836e8c57cad3c20eed08c7adf1bc9

    SHA1

    ff3e13e254b599705da3e08876d55b367b33a7e0

    SHA256

    b8f57df065bef1123cffe6e5f1a76701bf0b8ba701adce3d3770fe531f155d45

    SHA512

    6c9d1f710f0d1dabc88fe0d8392f6fce09654148f51b4ffce7e171bfd7d0cd64e23dec9c48028f81055340ced319c6dd576ff869b4120a261a8d653756eec341

  • memory/2972-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2972-662-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB