Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 20:27

General

  • Target

    24bcdbbdca5ec9bd75ee4f0493256cbbdf85b0ff15c97a2fd8959f5604568481.exe

  • Size

    54KB

  • MD5

    b467501dfd36954e9c4055aa8a00d641

  • SHA1

    0f40ce6dbe8903c270228fb1f915283bfb7f625e

  • SHA256

    24bcdbbdca5ec9bd75ee4f0493256cbbdf85b0ff15c97a2fd8959f5604568481

  • SHA512

    699d7134b736e01c0169b2457871481822d8844a070ab30fc599f38a81da13d51b7e6799f6eccd0df07d7b5a3cc71a8bb313b987718bb959d05261929c451a16

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2r+:V7Zf/FAxTWo5

Malware Config

Signatures

  • Renames multiple (5037) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\24bcdbbdca5ec9bd75ee4f0493256cbbdf85b0ff15c97a2fd8959f5604568481.exe
    "C:\Users\Admin\AppData\Local\Temp\24bcdbbdca5ec9bd75ee4f0493256cbbdf85b0ff15c97a2fd8959f5604568481.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    593d00e9b63870b2de5852391fe29881

    SHA1

    34570e59df942d6c3d4fc16a6c6e0734498afa62

    SHA256

    bf02afe4a7914ec26bffb624349f1bcf64008242184d6e1e940e4e7c2395b64e

    SHA512

    52e85f741ac095dd00d5e28c3d7e18ad98ffe66929581bb2b7cda87e3aa3658800f5df394f6aec630b332a4d76d6510774765be7b436b0feeb28e557bf310054

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    153KB

    MD5

    feb8287135984bfba5ece20f6f86de36

    SHA1

    789bd1710676f91be5429d678351397973178652

    SHA256

    dc805894dea0811ea491f716ef20e32d99a01224becfb081356a472ead5250d8

    SHA512

    bb4f5779ef51f66b7a9cdf1fe4589a524d86a6e95e3c4d1271ab1d71abb6b0ce4a9e6e9cd2efdef8d4d728a832acd4291fffe0cedb6acdf43d0e1c4892439265

  • memory/4428-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4428-860-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB