Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 21:54

General

  • Target

    638375a8ff9510e3fd1dc67602483dd0N.exe

  • Size

    47KB

  • MD5

    638375a8ff9510e3fd1dc67602483dd0

  • SHA1

    b9ab505af3919bf1cea947acba1362a5332c3a4a

  • SHA256

    9e10b1d3bfaa6f2ba0292a0264f3e6e04c6ec27e3eb8c548a7c2c95343ebfb56

  • SHA512

    4ac77147f10da1739b55db0a19c268ff373b0e424d36e92feaab891ac497842e6b034c69769e94e6fe4fbc72f3c07ac21ad3143d1e7fba60645013a043cfb3ac

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdA:CTWUnMdyGdyqWFx5

Malware Config

Signatures

  • Renames multiple (415) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\638375a8ff9510e3fd1dc67602483dd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\638375a8ff9510e3fd1dc67602483dd0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    05fa15abf7828fb85b319e0c59781d9d

    SHA1

    e6d440aea93c6544adea9e639ae0098dad7d9cf3

    SHA256

    9a3f32d684723a8d8544aa9481433e838326293a06b6a5a3416c8fe349cdeef9

    SHA512

    e0142f1043269f9dc2f2cf42936bdec69d289a1694dd3ed1eaeed10044645eb19fe1e7b1c945ca1d7b520416b4bf539359fc718db10ab2f1ad6358336f7856fa

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    a2c0441b1884db10a4c163fb211dc146

    SHA1

    b8e6539c7a6c931ebf303410c275c45076e9cd57

    SHA256

    c6795b54df88a62a5f5c544f869b38d31f6e72972408c510bc792f4ac537210e

    SHA512

    e6b682c711a9c8cbcf3f2e4fc1484e5fe2a41df2dddd9ae85da926c4b0a713264b2e3d931dba88575e5ec4bd16554ea41fbd8fbace8586a2fb9ecb2e230baf75

  • memory/1140-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1140-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB