Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 00:08

General

  • Target

    87ff90a1b3c490f79fb8d1a915730c99a1e5059a9c09147e1ad93182113c524c.exe

  • Size

    26KB

  • MD5

    0c206f3f112ccf225bedb2b062515a32

  • SHA1

    70d78b640a89d58c358e79cfae32e3d93b64c627

  • SHA256

    87ff90a1b3c490f79fb8d1a915730c99a1e5059a9c09147e1ad93182113c524c

  • SHA512

    49ae76f6a2b0b72088249033d0000db1f13b438ff05c2136918c33c3b48c0f0ea734e9adec9783f69635f7ee702edf7f41b2b9cecd7d27ac0292867b3afb7c4e

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9Ro+QOViJfo+QOViJ6:CTW7JJ7TPUN

Malware Config

Signatures

  • Renames multiple (4066) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\87ff90a1b3c490f79fb8d1a915730c99a1e5059a9c09147e1ad93182113c524c.exe
    "C:\Users\Admin\AppData\Local\Temp\87ff90a1b3c490f79fb8d1a915730c99a1e5059a9c09147e1ad93182113c524c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    26KB

    MD5

    f030330efcde4ad9cddbaa003b053569

    SHA1

    68699ea50e13a48793d72c4613085bf1dd7855ca

    SHA256

    738beca37a141b7c7ca2243b6a328e74b8e20cc2af951072d8788da87b116e2a

    SHA512

    e271eb9693d30ad972bba4e396066acb7f63c99cf84a2f12cfef4ed1f4731eae5491186a85cefb5744eafb102c93349418302a79c6d18d81b11041e52db8f4a0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    35KB

    MD5

    b2fd3cfb1bb875acef2d82b5122b90ee

    SHA1

    fa2ea57709e631aa8297220bb604906858f3ed17

    SHA256

    6eb53e3442bacb982e45246b5df76d6609b58668555663a6adfc884604e4983b

    SHA512

    db1e7be28dd5bc92576d3ce126c174bf66d4e88cc7700acb60690d40b215feda4db8f71807bf34d4bbc305a1fb23c29785f9bf0498e8e860bd14c648eaa3dd71

  • memory/2096-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2096-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB