Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 07:33

General

  • Target

    68284ad15200e73955efdbb31db06120N.exe

  • Size

    49KB

  • MD5

    68284ad15200e73955efdbb31db06120

  • SHA1

    6c8701bdcf411e9d9869516c0f638ba82171a5c6

  • SHA256

    d9b86df2ba4fc00bce88da22079663aa11b51f4f7ab4bd5f39c40860001edc9c

  • SHA512

    6c88d31cf0d91c93dfb8b9b81eb1332e60d7f05b2f64d7542e0e3dbf22ae6e4e8975927cad7a491b8cc553a5e6afc473e365e2d14c4696408c8a6eb9940b3b7b

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9MFxFk:V7Zf/FAxTWoJJ7TD

Malware Config

Signatures

  • Renames multiple (3285) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\68284ad15200e73955efdbb31db06120N.exe
    "C:\Users\Admin\AppData\Local\Temp\68284ad15200e73955efdbb31db06120N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    1587b319fd5578638ef8293749111160

    SHA1

    3b630d0ef532ceaf63654082b95ee14b0fca9721

    SHA256

    484aec13fedc1ff1b07d4b6177f286c583a06e33b0c5bc61ff104bd5e55405fd

    SHA512

    1e87dcf9e42c87a3c84394b54ab274a3ac190dd08c29d79f7fd9cd446e7a92cc622a5725fee781b77813ed97b99441809e90780b486f2909961d84e8b010f1b3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    a6e3e4aca32107d7abffcf356a9b305a

    SHA1

    9e2a7a751047557cf9f2b69065afcd2a3b0eec06

    SHA256

    b571198ca71987f73449535dbced67927262714cbd010ecc2ac258aeb3fb97ba

    SHA512

    a6872569441ef63b2193b8cde868636bd348194bb66cc1fc317563a2f915f255f0c26372580e54fb429e0a622c081cb0efbd2f542e2b59cb4fd39aeb474c1181

  • memory/2668-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2668-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB