Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 03:33

General

  • Target

    d32a2804518f8135e79637b77af14cfd1ef213db6497be136a1124de59bae60f.exe

  • Size

    30KB

  • MD5

    3b0279936f4a652d9b7f122053703887

  • SHA1

    410198ded33cc9e64f1fbf8902a9bee462d4c11c

  • SHA256

    d32a2804518f8135e79637b77af14cfd1ef213db6497be136a1124de59bae60f

  • SHA512

    15a9c3a510baeffd01b7f3694fd2af8b42124ac9a2b181e9072c9825b83e11ef511c424759baf64b2264f920e9745940c2843db732215f851f7902b9ab655e89

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9woOzOuiJfoOzOuiJb:CTW7JJ7T4MU

Malware Config

Signatures

  • Renames multiple (4147) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d32a2804518f8135e79637b77af14cfd1ef213db6497be136a1124de59bae60f.exe
    "C:\Users\Admin\AppData\Local\Temp\d32a2804518f8135e79637b77af14cfd1ef213db6497be136a1124de59bae60f.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    30KB

    MD5

    b15e78f33d578ff5c36fc2c531ce94a5

    SHA1

    3c092be2abf547e025d634bdb4cb6b70143d37f1

    SHA256

    d48c85d90c9464e4d31fe36eda3e7e2c0235bdee549e642b10c51c779cb9d117

    SHA512

    4f1b245618862584148ba6bdf93e9853d32bff7f86f9a460de913cc5ddfbcc8012ec353119ffa9a32f2fdfae9b0673785432152b84278f35a9645a42373a54c1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    39KB

    MD5

    a23322ba15d9bf3d68a40e91ce79fcc8

    SHA1

    0866b3eb09aee2bc541b4ebd55db5c54b290e975

    SHA256

    57e56c187ea755a7c16bd9da45444fa4c6296a0941f7421997505a3f793a276d

    SHA512

    5d31ec8d80ab51ce9493e2de2a2809c88b4abd7ad17931dd49e8bda79a1e71fcbdc884203d5fc33f52544a9813c3fcae4f35ab86cf7bd741a864c7ebe08e0768

  • memory/1872-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1872-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB