Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 03:32

General

  • Target

    40180e114f2d742b83e4d51fb6370d80N.exe

  • Size

    73KB

  • MD5

    40180e114f2d742b83e4d51fb6370d80

  • SHA1

    46b0f86fb905fd8c5e1902428ab9baa8734167e3

  • SHA256

    9c4fe2cb07deb134a853565e85cba74527167f1c072a08bff3439458a6c9a134

  • SHA512

    c928eb336d1ff78825594c19b97996400c8ac6693efeb2e4ef7bae444db1bad48a97dbe85056ee9eeddd082e26bb1854284491e7d117b1f16950028bce4e5382

  • SSDEEP

    1536:V7Zf/FAxTWoJJB7i2JalYNRw3XTW7JJB7i2JalYNRzqUS:fny1c2JaCc2Ja7

Malware Config

Signatures

  • Renames multiple (3220) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40180e114f2d742b83e4d51fb6370d80N.exe
    "C:\Users\Admin\AppData\Local\Temp\40180e114f2d742b83e4d51fb6370d80N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    73KB

    MD5

    02ffd281c4e3742dbfa00bbb87394f3c

    SHA1

    07f64c2b66aa6e34b0974d3b04498e78aeb40e12

    SHA256

    83fdc9dce282fefa300dcfc7764c06e32223eb9419baea78d35835427b24c1d6

    SHA512

    782459055f3b3e3d6ab7709cb1f0676186692764cc9c26dd13c0bd61cc8b28c88d0325f4bc22bc7047fa58d82cbf4549a89dda0d56b800af73612258375ee395

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    82KB

    MD5

    d501baa3cf4af5f704dad45ede9d8ba4

    SHA1

    43d1a74f1db26006ace89b011b3c0acd19d21676

    SHA256

    da5f76dfeb443f9eb1bfb5c73df07532417fb58d28d68cbdc462117445460a0d

    SHA512

    99265ce3f8b9da6ab4ecfac6a15e6e0ddbaadd7624d88504246ecee601cfca276c27946647e9bb8c15d758f8ea0db38d80ec603f179fdda43c06b48d05ab0510

  • memory/2216-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2216-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB