Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 02:06

General

  • Target

    6cdf8db85a4a20fab05e018f860ef160N.exe

  • Size

    52KB

  • MD5

    6cdf8db85a4a20fab05e018f860ef160

  • SHA1

    16b30a8eeb800e2922d306a438ea1b11cfa2e3e4

  • SHA256

    f93383a1164448e54550a5eb3e5a63a8a1de3076aaa4bec36c77ba85edd5226d

  • SHA512

    8aa1c9536c2df4c6237c8282fecb344aae7f6693a88784c4fa5e01bab1ca31e6e0c1ab99e996cfd588f0acb43de2086e8f48e49a5b7a2cbe5850151b828c67b2

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzC:CTWn1++PJHJXA/OsIZfzc3/Q8zxgWK

Malware Config

Signatures

  • Renames multiple (3185) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6cdf8db85a4a20fab05e018f860ef160N.exe
    "C:\Users\Admin\AppData\Local\Temp\6cdf8db85a4a20fab05e018f860ef160N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    375374ba8584805c1367e88bbca0e000

    SHA1

    d152b5d07f4735e5b39a3e2ce91987d89459b5be

    SHA256

    62238ecfe19768679e65be7fc34cedfddb50ff322753b21bdffba70298be68a0

    SHA512

    53d1a274b0ff4ca93a46fd95a2dfd4f1ae558bc8a34eb6dde09839f733f02ff2f7811946ea24d02aff81a9d787c244a873c7f6da72ce97908ac85337956bf408

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    b97b18b57d089003305f8b58756bdfd7

    SHA1

    8dc14335bcec2657df16839e0e4bf8c4aecf5087

    SHA256

    f155abbea000496ac3b4f627fe26a13899798aa7037521f9496ff3fdeefcba93

    SHA512

    bf4c5061959489ed0de1b007dc435a11af7e085503459d0365f13fe8eec1369819bebb3e4d5835d3252d15e8fad85e69f05890ba90ea95ce2f003fd2f3378891

  • memory/2296-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2296-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB