Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 19:48

General

  • Target

    1fd9fc1928a6ba8341866cf6d38d6050N.exe

  • Size

    55KB

  • MD5

    1fd9fc1928a6ba8341866cf6d38d6050

  • SHA1

    03b34242512521d7f1485bdff0775d5fa6b3246c

  • SHA256

    5fffdbd35c944b6f41cb513c2184c7420520c079916d438097cfa160e20ec005

  • SHA512

    4313976e7f619ffdfd068fac3513010e1beaa71b8729dce5d91a175f127d704f46a386fcdf1a33967de8c869b910ceb5b69f6db34b1aa12b9f99b30b9ba300c6

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8IZTcM4MT:KQSo7Zf

Malware Config

Signatures

  • Renames multiple (339) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fd9fc1928a6ba8341866cf6d38d6050N.exe
    "C:\Users\Admin\AppData\Local\Temp\1fd9fc1928a6ba8341866cf6d38d6050N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    92cf486079658ee0a98d49a9a08e1450

    SHA1

    0cbc5243ecd936f21f0255743a950ad3e7f0d7ad

    SHA256

    cf4df4da772222d343f69fafbd887eeae9238f7447fece5be7abb15048807289

    SHA512

    33cbf59b199bfcdceed7467ae5b79150057bbd524723eb4c97809c82b2a19eec177f8ad1201a91ce1fad1577d7b881134b08855f0cd7a1d3e4005d67d3d9a5ee

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    270d569c6ac0e715b0b5808d04a7a9e4

    SHA1

    71d1b3623e6d7b46fe865e471ea3dcb9ca6999a2

    SHA256

    db2313df78493f623dcb407ab09aa779cb9552c77266ee3664f4c0c47d0bb2b9

    SHA512

    80f2ec624cfa4d8cc0bfd7e2795c742344b2c19ab292dff95637bb0cc080069a3c03224bb83f8ff2f0131293c7ec2aceab11c017ecb37561796ae0c0cedab466

  • memory/1512-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1512-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB