Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 11:34

General

  • Target

    eb7121a9d986224892ec512a47f41c90N.exe

  • Size

    24KB

  • MD5

    eb7121a9d986224892ec512a47f41c90

  • SHA1

    5799f071fbd7ea4ec059305c8f47e660dc1b1c32

  • SHA256

    2bb5ab048e6af08e5c35ae3d1aed5810acca1fb552a38fd6232eb5c67085885b

  • SHA512

    d033db1ace9b7bc0e1638099233550b1221a996a41724a4615f182b845d1e46b5dc876299a1ed1aa2bda6b518f976406b89684df6190e20d1230db7b06bd9a15

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI95GbGK:CTW7JJ7To

Malware Config

Signatures

  • Renames multiple (3781) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb7121a9d986224892ec512a47f41c90N.exe
    "C:\Users\Admin\AppData\Local\Temp\eb7121a9d986224892ec512a47f41c90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    24KB

    MD5

    4f9fb6230e8527f082e1acacc7eb0c13

    SHA1

    c3a2be040f8a558c34ef552b7ee10730de2fde37

    SHA256

    19f6db32e043d1bb1d8505fd70aaaccaec1620fab5904c34d82c919dff11ffbd

    SHA512

    cb605ed19a819b4c71921b25e205b6cd99532fb18633fae747a5e6d26afed2c09fe539c78cfc52887d803cc4c65091589508fb2998f3c398e97ee3a65fb17a6b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    33KB

    MD5

    634b1edb1e214eb9ba543f7732e164dd

    SHA1

    c083ef33fb1505fc4cd6ed9b839f9ba79c9549f2

    SHA256

    13c207950b4bceb1ece4a4024ea71c7afe9ef715434f627a4efa42a4d418151b

    SHA512

    7a285b5bc23656f5b94060524c1b7807a0efdc6322dae1651cdea4aa410de46f2ee4229f823ce2317c1a58a9718f32b07231df6e44c3a1f766c32b1d5b85aaf5

  • memory/1732-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1732-68-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB