Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2024, 23:12

General

  • Target

    1aa2ef4b7bf33d9258ef7d7e6fdf4040N.exe

  • Size

    30KB

  • MD5

    1aa2ef4b7bf33d9258ef7d7e6fdf4040

  • SHA1

    70a0e7c7618af9c9094d1badbc6f6ab8d789a816

  • SHA256

    a84f489740909ac4a9d1b15fed0513c2a888154c73479c81a8b0895650d1495f

  • SHA512

    4fea859cdc2c86ed4f48d5e8fbe4291a424bc5268e5e21e5f6fa1551d36e66534571aebe05b7ef37aca93c7a23a723cf3627a0b57d591d265404e260de216bdd

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNyQYz:CTW7JJZENTNyQYz

Malware Config

Signatures

  • Renames multiple (3461) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1aa2ef4b7bf33d9258ef7d7e6fdf4040N.exe
    "C:\Users\Admin\AppData\Local\Temp\1aa2ef4b7bf33d9258ef7d7e6fdf4040N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    31KB

    MD5

    46525cb4fccb97e6fbbfa6208bc32738

    SHA1

    fc38db4ca4c431b1c0cdde2a5ef26e0cec85d0c0

    SHA256

    499770335eccd04c132d6990456697e0056b2465de85433f79dd782779f7db9a

    SHA512

    ade2343d78158b69fc10e2934dd78df9424601091fa0f3c1bdaae8e83a6dc3301ad06e7b3fc6725b51f31c1d2f13056bc4141cd9559ca253d32327d9363a6ba8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    39KB

    MD5

    148d04a470ba260f90b2e1fc13c61867

    SHA1

    36f14ff621689c22ad05efebde54da78a6f79b81

    SHA256

    270e2eb05bbc655ad2ac854475e8bbc9449c3a1ff594a6d9c01778189c58fd9b

    SHA512

    05ba4d5447432469d1a7b02680d26dab4d9dd67f1570a7000b3f7b9a98c017b39d792e0a80fed6a974ebf165b826be7b8b8933de0c675238e7289c16f05c3e96

  • memory/2216-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2216-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB