Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 14:02

General

  • Target

    84ecf03159e665094b40610db1a74a10N.exe

  • Size

    25KB

  • MD5

    84ecf03159e665094b40610db1a74a10

  • SHA1

    2902da62e29029667c16c274340752345900033e

  • SHA256

    5f9026c275801c1a19633e009a8940cc6ff667a13ccb2725c357266c90b28437

  • SHA512

    9de73755ebcdc2d9fde2b1bf48507420debe689fe6166658a908c6e3f3bf806d6d4959b53022b6d6f8a442e4a10355efbc2082fb95fc687996143a14f4f5a8fe

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9mHJGvBJJGvBM:CTW7JJ7TEHJGvBJJGvBM

Malware Config

Signatures

  • Renames multiple (3456) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\84ecf03159e665094b40610db1a74a10N.exe
    "C:\Users\Admin\AppData\Local\Temp\84ecf03159e665094b40610db1a74a10N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    25KB

    MD5

    6dc61a796f0386488a31a348c1296c42

    SHA1

    e4586d2bf7071f6f92d7e174b3b7c3172702b588

    SHA256

    dd1fc450d5cf19d858000274f2cef2649685993217fe3948395dbc21cb10c161

    SHA512

    17bbba19d506307a4a7fdc733ad96d5453f782c11f43481dda0475e85b9ca68652eeec015879a1d26334d6d7f3a395d32925da9de83e9925cb16bc36501e3a24

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    34KB

    MD5

    5c25a817748ae1959386d134b7d82f80

    SHA1

    7cebd732a4a7185c41a6bdb897199683ba358a7b

    SHA256

    a8c01e3e4732c45ab6bd217359487ab6b3da4351e1be5cf960ac2cf4d26a3bf6

    SHA512

    abe33ea6f89cb14331b4a792e222c5a8b3676bd5ddb3757616fc90867587cfd41dae4fafc082c3abe545023ccca4467cd118c8fc66f271a5fbb303cb6fc7fb98

  • memory/1960-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1960-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB