Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 20:52

General

  • Target

    37dabcae453c3c6b3e291b6bcd5fd5b7538ca02d76f6382fca890c6b60696e0a.exe

  • Size

    57KB

  • MD5

    b508dba54122afba49063d793c5d82ea

  • SHA1

    2cd96c99935198a2ffd7f4353ec803e1c1701803

  • SHA256

    37dabcae453c3c6b3e291b6bcd5fd5b7538ca02d76f6382fca890c6b60696e0a

  • SHA512

    53fca5ec6e8d3425400c60e48cf678e107e2a3459c943647b821865bc321ce535919165be7b4acf65922bfcbfbef76c8f661242ed5419ca2f9aeaaea191964b4

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mdx:V7Zf/FAxTWoJJZENTNyl2Sm0mPWW

Malware Config

Signatures

  • Renames multiple (3687) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\37dabcae453c3c6b3e291b6bcd5fd5b7538ca02d76f6382fca890c6b60696e0a.exe
    "C:\Users\Admin\AppData\Local\Temp\37dabcae453c3c6b3e291b6bcd5fd5b7538ca02d76f6382fca890c6b60696e0a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    1edd6e4fe58546043c089f289aa6a176

    SHA1

    db5c9e32722e0083e759ff4c223a32b4305aed31

    SHA256

    13e364f6bebe4b0f5d8b445cd2acbd4a5fa27b812e53f465505ad049b53dd388

    SHA512

    8719ba302970a106709ee225e2d2c0f1ebcb9b5d9fa91df75d2cf451d2fa0d81785559682711ed0f33b14cb7da1f22d71e84e8eee1581b197c165cd66883d66a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    5899d7dc80c824335c173bee7e1d0949

    SHA1

    fc588a0a4de5c7dca635b9734fc64c79eaf521d2

    SHA256

    b4d0bc5f8b50af9676628588a6d0b3ed4185f4b4f263d5f7d89cd05dd0a2c3c6

    SHA512

    9efc0e23f797bcd00ac09a069c8fa66822cd45efe8885d94d42875ccdfa9325fe4087bd36beb064754665606c3711ab97627d44be31514907fd088a0e4a5fb78

  • memory/1000-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1000-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB