Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 15:30

General

  • Target

    0065bd069cf70ed83f7fcc1163cd55d0N.exe

  • Size

    39KB

  • MD5

    0065bd069cf70ed83f7fcc1163cd55d0

  • SHA1

    5bf3d35a10a3affbc7dd606bce5e1e15578d3a9f

  • SHA256

    6ee851358efaa71d47e9196835b16a6c3d107aa2751db36b93e183c9131b45f7

  • SHA512

    6f4e2b95b51a661adc1479b953c5fb62ef9377daf22ad60f1581bdbbd6fb5130693638e9745b5e88b6dcab9d88d7ded8c0ea95b53973cceaacdb63979881442d

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0m+s2BGUGmHnHV:CTW7JJZENTNyl2Sm0mKZH1

Malware Config

Signatures

  • Renames multiple (488) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0065bd069cf70ed83f7fcc1163cd55d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\0065bd069cf70ed83f7fcc1163cd55d0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    2bd46c78d9be677d318a71d239c9b2e0

    SHA1

    0a28f2ed381f95bd45e9682781e06c531c8bb6fe

    SHA256

    71b4a28bc8d5fd742b2ca96ec07836b24c486be597c4d06fb845055329080af9

    SHA512

    a49a3b2ccb79db686cd8cecaed5dea79033796bb4fb3379f3ef13db9ba5106f607cd027a028e17d679cbfdedb688ec9e3983cb2b71adc3e1f989055ae01ba39c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    0948a53012193a1797d34f7de64d18d9

    SHA1

    8b75b4709cca0e5be92d5a42fbd5bc516f90cf6e

    SHA256

    c3606a1bdd852de59ebb53b721c4cdee24269da0c52ebc8f753c3a652cfe1e78

    SHA512

    d76bccb5f538e970131fe30fd518ea1d952989b32bafd0bb4d137981d70f30051972a536e3dee79b97397fcfbe6fd79f56ca8072531f1f7caa6da8ac504d1ea8

  • memory/2440-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2440-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB