Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 08:10

General

  • Target

    8d29807f3ccf071ef3d8310d82984a20N.exe

  • Size

    169KB

  • MD5

    8d29807f3ccf071ef3d8310d82984a20

  • SHA1

    5422598fc0257e640b4d51ed2840949c789d5d70

  • SHA256

    89c1010acd593876e1fc957acef2880d274467e3d7b6d989f5294d94aacf7cb8

  • SHA512

    0d68f8d8538d7c930cf18e1103e722227d0163f17b190268fbc557ed116697526650565fe816b40370b34d2db92eec8e2968b15449c41ddfadb2259f6debe68c

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8zx3Y3hx+fsio5UxKzWZ64+A8C4bwi:enaypQSo6VEio5Ua4N+

Malware Config

Signatures

  • Renames multiple (2827) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d29807f3ccf071ef3d8310d82984a20N.exe
    "C:\Users\Admin\AppData\Local\Temp\8d29807f3ccf071ef3d8310d82984a20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    169KB

    MD5

    ee91e7b64c5678622521f5f11b2bf94b

    SHA1

    eead08b4db56af1c67ae068d3c3c624cc038e1ce

    SHA256

    0321e56ab82beaed5180a9d51104d8bc481703547e94d711118adcfc36a6dae0

    SHA512

    dad736dc779d2f13d5887bfba1ea7a003705f96b49ce424390e144007c05c513b0672fb63b8a6194b99d77014e80188ab608c13a43b515628915ed0bf2df8dc8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    178KB

    MD5

    1f4575670db113b4a7923a67376babff

    SHA1

    46ad4d9678e7bd3c645ea21e16616a637e2a17e9

    SHA256

    1268f4f92bc8b12ebef1e23fd527cb55eddf25ac3f145fff8a6a577aae90f955

    SHA512

    e78a37d7c3fd9313ca403f27ef56aa0b1bc612b6731ee52ab67bb88b9927e2014506d55ec1219810459a8f4804c5d6ee78a8a2050ea656aa0eef62daf2813998

  • memory/2808-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2808-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB