Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 07:51

General

  • Target

    4b020b5c2ba64eb8ecd0f8b13dc3cb00N.exe

  • Size

    50KB

  • MD5

    4b020b5c2ba64eb8ecd0f8b13dc3cb00

  • SHA1

    6d9cf9ac70b92c5834a2faeab6ae458e854a051d

  • SHA256

    3f5583f75d4367c25a1bdf9ddd1cd1928150b9573ccdaad290c160667b01ad7a

  • SHA512

    9a9f4f447e3d693e34f0c251057c8be36cc725278dee8135664cab236f187b3276773862a5dac317437586eaee9d891b3399fe8e9ba41a953d1599ef1ca39cf8

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdZ:CTWUnMdyGdy4AnAP4Ww2wg

Malware Config

Signatures

  • Renames multiple (3338) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b020b5c2ba64eb8ecd0f8b13dc3cb00N.exe
    "C:\Users\Admin\AppData\Local\Temp\4b020b5c2ba64eb8ecd0f8b13dc3cb00N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    3da3f24b545326a462d8c81eff33632c

    SHA1

    2a7bb20c5b8c16e8e7b92dfb0f5cf376ad582cc6

    SHA256

    d257a940680222a6e307bf94dd8f8e986ddfee8554702f755188963b2e55a536

    SHA512

    71f184c130636f1ccff9c77b8d85616bff37121417ae8eb41ade38c07e76e0368b5a1a7a847ec34b37b2896e8952d6fbd456b5e1584fd930ffc34cb75cd03bd1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    0b4157e1c17b96607cc4b1bea021e9a1

    SHA1

    ac3ee5be3046cc0a56a4063d6d9ec7aca5799549

    SHA256

    1340d5026851935103bd963fee4ec22471f87adbaf7f90ee9419a7d35575c3e7

    SHA512

    1a1b9b4e12c38c26d24e475b881f2f3580ede61929c2e3c13717cf9003033af5e2b31b7a6ed19274c2a85e0a18b0fc0dc1bf8ca49f63353d7df4d2e3b4d59615

  • memory/2232-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2232-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB