Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 04:28 UTC

General

  • Target

    2e162ed2de2fb51dd67527374d1d5020N.exe

  • Size

    52KB

  • MD5

    2e162ed2de2fb51dd67527374d1d5020

  • SHA1

    028b8a89abcda5e56e2f408ae6359e8ab3d160cf

  • SHA256

    badb1e98980a077b8aba10829f68cae93c73c38096c564514c2f151b5520a8d7

  • SHA512

    8b8b3c49d06628a696852ad2e6a2847eb167f360ba909d9c29506de86969a781a86d6d0a2b6f81ca1cc46972b5ece58d8870bf4a270d502c839d9e2406032ccc

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9DJKGJKTEzli1xcEzli1/:V7Zf/FAxTWoJJ7ThJKGJKTfQfR

Malware Config

Signatures

  • Renames multiple (3344) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e162ed2de2fb51dd67527374d1d5020N.exe
    "C:\Users\Admin\AppData\Local\Temp\2e162ed2de2fb51dd67527374d1d5020N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    9edd79c5ce55c8bc8064eead128f2a21

    SHA1

    c903dc1e110a442d5eb8f1ade7907ed7eb2bba91

    SHA256

    de6e11121e24d03f104a15d76f160202856688f0bc57942dd3c58b1ee58cae8f

    SHA512

    dc2f223cefaa86a48e84e597f87722801d2079b18a9eb0d6348ab478052703085e825eb4a1d0b95cfc945741df574d430ae626a57fa18f853cec34d7fb7d1136

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    9bc469e555a712fa7f3a8769d8cb2bcf

    SHA1

    3c2d9b018acb996a3b73eda57cd6f78266e0b4e7

    SHA256

    64be95654c6da7d070e7c31b5da0c3975b5ac8e13a3c413dd1141dfd01ef957b

    SHA512

    a8a58f5e0d31050670778d8a60c576d6b9311e5f469c5be7f656b07f35e74a593d5d870403f53027fee0f9e9d2056a34d10ab14e44c91ea4f1c11178e1d9a2ec

  • memory/2556-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2556-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.