Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 10:42

General

  • Target

    16d60e61b5a01e6c5ca801b0834237e0N.exe

  • Size

    166KB

  • MD5

    16d60e61b5a01e6c5ca801b0834237e0

  • SHA1

    1983d4cc898fd90266a9cad44c4617b2f711bf2d

  • SHA256

    bd47661839824d42ef14f76d3bb2abf852655a87a7a466d974a8fc458dc86e54

  • SHA512

    bc05504feb4d38740370808344f620c4b94690a44baadf347b0ca9d9fdb508bc8264a38bbcacf162e12f047268720dc5f08ef58048620de5e6aa117896daf7a2

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8zx3Y3hx+fsio5UxKzWZ64+A8C4bw2:enaypQSo6VEio5Ua4NC

Malware Config

Signatures

  • Renames multiple (246) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\16d60e61b5a01e6c5ca801b0834237e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\16d60e61b5a01e6c5ca801b0834237e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    166KB

    MD5

    d4ea2320d681212f0bca86934cc93657

    SHA1

    22c7277e7256440a2ddd323fd42ff94018ca574c

    SHA256

    538f7d85f4d10be5e3a69e2d0e37cf5d241d59f58096aa2d365c160fb5edec23

    SHA512

    6a6742e8cd2ade72a7fb4d6be7bd7e97507c14085dcce1ad9d8b8fd4d66dec73e7ae19879d8e579d15b852f04229fa8a2a5a3bba0c7a4ccdc73d7173cdae4e3e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    175KB

    MD5

    afb9e4c299be09ec25a93b51cc7b0bcc

    SHA1

    57676c62c4ce933c887f72dcef98ac01368e5eaa

    SHA256

    6ea809502a77125e02e0974566bf91369bb2be482e4b7a51d83d72f676eeaba3

    SHA512

    d79f09f4c78e7b574e792da3db757620dae3c81eca58875fa45e8e5b2124c3274c3d246f22a0a685ffa0f686c242d433311ce412a0c8623ea22c79f5d86a427a

  • memory/2468-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2468-26-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB