Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 05:08

General

  • Target

    c1aae1af6d1609ea0e0d7aa123e67a90N.exe

  • Size

    56KB

  • MD5

    c1aae1af6d1609ea0e0d7aa123e67a90

  • SHA1

    e13b181808bcba5b451267177894f3e5fb26f35e

  • SHA256

    484b3a535c24cffa08a32f6e1818e30830331a027e3735d7dd5cfad1ffa57f42

  • SHA512

    bca9120e53ef5aa2054d881559d3cec76d8311ca9425e28ff50f9a0f57dd6144f2362e3edf4426f72fc585889e8866b9cfec0bcd5208148e9476834d6cebeb01

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9BQGwj:V7Zf/FAxTWoJJ7TnQGwj

Malware Config

Signatures

  • Renames multiple (3384) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1aae1af6d1609ea0e0d7aa123e67a90N.exe
    "C:\Users\Admin\AppData\Local\Temp\c1aae1af6d1609ea0e0d7aa123e67a90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    7ab5ad7a62f0542a315488700bfc5e90

    SHA1

    1fdddad5b83000d9aefb0a164736f7563b9ac088

    SHA256

    7aef6df4c95ab46aa8bc6540fd772cef9d873b94fdf60d9b1b58224e2fee372b

    SHA512

    c4b6cd8e105250796799ae9c6a64542a8c40b5906d0ea6c9f29aff726f421490ce063bf1acd7d608e583836ffdf77ce04171354e26bfe1bb28fa945507b7a846

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    18338ef73baac1f46f2bf640cc7776c8

    SHA1

    6976afc309c4c3560b96a094fa0d484bb7f894bb

    SHA256

    8bfa3fcc3ea1da056eae5a3ff30880567f985d7cce2fe32f9bce2370b073e9c2

    SHA512

    093829c5f39100e0ac4a2850b94045692c0797f26a96769549bf53b6ca1082fa65371573b38356414d00f663a15fe9b2b93fce76bf6049c8b2719580cc710acb

  • memory/2388-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2388-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB