Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 03:04

General

  • Target

    e2e03ff23254888f9cfce049d00210b0N.exe

  • Size

    169KB

  • MD5

    e2e03ff23254888f9cfce049d00210b0

  • SHA1

    b26587fca99425b02d405f176a3d3f7e6c4f163a

  • SHA256

    d4de936b19509d6f7df0dbdf6b8c11a120fa366079db130cbb5b03faec486df8

  • SHA512

    5671e422dfb125e21d5705e02b2d3e09b82efd6964da2691662869f148f5338fa469f1371597e65a719938f454f5e3bba3440c3e9e6b2ec3caf3aab240410f87

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8zx3Y3hx+fsio5UxKzWZ64+A8C4bwy:enaypQSo6VEio5Ua4NO

Malware Config

Signatures

  • Renames multiple (2784) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2e03ff23254888f9cfce049d00210b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e2e03ff23254888f9cfce049d00210b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    169KB

    MD5

    81c8d2cc006b2837d588711837494687

    SHA1

    fddf73e7a86177ccaa62dafc8f482499c9a75ded

    SHA256

    bf65de9b93f27cc0c93f1a192a4818ccdf782620fc9f730acdda007273d9142c

    SHA512

    462c1ead53a0641f6a35318f7085f8f9cb27481cfb9a5190187c5b3f10b9399c58ef6d0817e9f43ca8467fa0be282a07d978e018d78b6f9e39bcedd5d17cb4ec

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    178KB

    MD5

    68d37d03997d5c73954ec4711ffa62e8

    SHA1

    483dbfea473e06eb770dec8c0cb23fa2d200500e

    SHA256

    59a84ccc72639d99baec0886c4feea49078d7902d1a8cdf841390793b84b7868

    SHA512

    0806380d15e74faa144d237f1326e6ae8789791dca7cc6fcfa806203525742a134cf155e17174a26d44332d64c85a0a26bc94ab4e3cfed0cf637d650951af5cf

  • memory/1820-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1820-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB