Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 16:42 UTC

General

  • Target

    8742f667213551f5eea4c71179627e30N.exe

  • Size

    82KB

  • MD5

    8742f667213551f5eea4c71179627e30

  • SHA1

    ec40cc0e3b854df64fc8c446c0cc49053fb46168

  • SHA256

    c2a61e77e73aaa9cf88b32e2044bdd36ae319587b4aa143e864f1b1f1625a5d7

  • SHA512

    5918c2d42e00430722d5104bc8ed15ce00abc2ef547034bc14e5fed05d8d580b8f543dca57a7cdc17f1ec4db160caea3bec2b612a5d6589f3d91b9b758c6a02c

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZR9TZi9TZG:fnyiQSo7ZTZcZG

Malware Config

Signatures

  • Renames multiple (3168) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8742f667213551f5eea4c71179627e30N.exe
    "C:\Users\Admin\AppData\Local\Temp\8742f667213551f5eea4c71179627e30N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    82KB

    MD5

    5e5dcc60e01ad86283a4ddbf97c4ed00

    SHA1

    b592617a40c0e79a027200c3fc24bf025e4cac3c

    SHA256

    f2b1318adbf3761751840f8a2dc1990c789af127a630b5949fa92851a3980ddc

    SHA512

    fcb5a8dd0105ea1be6cd3051b9ab14e4bb5e3f76523fae62a7906c884061fda0a584ffb1a35729f587f1f09646ff5ea59aa01526d757090bb488eb26d7068865

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    91KB

    MD5

    d6a42fe0539e0cfc1f565a654c233984

    SHA1

    67563b6a34430962b0e4622d93564f571471d1c5

    SHA256

    181dfbbb69863132a9b3f880d206b911f29f4c834f3c6fc29a41de4f123507c5

    SHA512

    a8e8a4e167bcdf5e6eb4b5e92093a8cc3f1db0d761b24a419e310ddf1ef6c1ddf1a719c21391c8a8747e83ee16702a5de7600fc8087bd3eb9a660c99992fc70f

  • memory/2540-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2540-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.