Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 08:28

General

  • Target

    9f968157ca8fd0f96bfa9cb8ec082be0N.exe

  • Size

    62KB

  • MD5

    9f968157ca8fd0f96bfa9cb8ec082be0

  • SHA1

    31115982034b8cf62bbd0791acb44f3de59b1cee

  • SHA256

    9bdb0a3cdf15e7a8e5478abe505cefa721d48314409846d3aee9fad56817c335

  • SHA512

    fe23ff82200d6454cde1446c43a1dd0159486300de78e3786f33673223b722e35f2cfa76a7ef8005b9fa4f99273cc30a249fde030486891ddc5147cc84c60a7e

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0md3:V7Zf/FAxTWoJJZENTNyl2Sm0mPWM

Malware Config

Signatures

  • Renames multiple (3209) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f968157ca8fd0f96bfa9cb8ec082be0N.exe
    "C:\Users\Admin\AppData\Local\Temp\9f968157ca8fd0f96bfa9cb8ec082be0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    62KB

    MD5

    40221ca43bdbf67ad7ec8c29dd90babf

    SHA1

    d360426c306136ae81d0d896012dfb60083d5afe

    SHA256

    67c9942f4e52c5524b370691688e7972d429977b13d5f93719fd9835383ede4c

    SHA512

    fb0440d295a2aada7aea82fc6655fd2a04db5eb11ab48386f531446d703a840e1964fc9791ba10af76549e76f8a18877711e3d7f60a9b485b8aeca592dd05750

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    71KB

    MD5

    453dc91e002c89d8f7ccf0a89bda0266

    SHA1

    767caed6e71a39f9bf564c18a8d8569ef56edb78

    SHA256

    ca8a7e973fdb7ca70be8a1a30abe45d9a11f79aa42aa910d1a1c4d3b471760d2

    SHA512

    bd9335c37844965726413393d0a2aefe3cf96cc53e656bd86522896bb4ddb2e6ad8fb99c5f0b8f1182dcb75aa2258c9d0ba908bebdf1dbe0038578126e996cb4

  • memory/1280-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1280-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB