Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 01:05

General

  • Target

    7ccdac7e28e59b4267ec7eb11eaea8ff353b8d21ceb1d1a8e0ce1ab32a6a2978.exe

  • Size

    39KB

  • MD5

    9b162daaafe52ff557cd2572155a46ca

  • SHA1

    89111295f39784627e007121e01d025693e37635

  • SHA256

    7ccdac7e28e59b4267ec7eb11eaea8ff353b8d21ceb1d1a8e0ce1ab32a6a2978

  • SHA512

    287b7d9cf9fa8e3382cf43d1dbe2a2f70488cd8ab1d5cfa6c33e0dbe3b07b151f547e904d927c532d558954c57f1293247370373b99d69a7ee7436398200f9d3

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tifhwRDThwRDk:CTW7JJ7TTQoQZwXwG

Malware Config

Signatures

  • Renames multiple (3789) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ccdac7e28e59b4267ec7eb11eaea8ff353b8d21ceb1d1a8e0ce1ab32a6a2978.exe
    "C:\Users\Admin\AppData\Local\Temp\7ccdac7e28e59b4267ec7eb11eaea8ff353b8d21ceb1d1a8e0ce1ab32a6a2978.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    2c84ed4df9528047615c82d5ba7a9378

    SHA1

    bc8233a5763a2dac49f973f5ffa14ed169e6664c

    SHA256

    1af7be2f61d79846818bdd6f0600efdfe2b7b91f250e44bd1262fd764e6f9209

    SHA512

    395ad5112ffc38780a485399ba955e61e83e20a099d13d8ba60b4cbcbbd3b977ff18371b162cbde61685603b7832f8dea26eed2d665914ae5d01a6fca28ec563

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    7466071ce2ec722cf26bd999320e2448

    SHA1

    6092adf5f4fe873b4692b9d9c257742278ad3acb

    SHA256

    e5b522090bbaf23afef57eda58512cede3b56e7f20778ffc0e61771747d1bc11

    SHA512

    a50c3181d092012057098d5585e0d29db85383d59f1f6c6cb70f0ca4f3da4d0d4dc48e8ba30ce5fa38620e83d875e458a94cfbb25124f69cb8d565a881b7c5e0

  • memory/2700-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2700-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB