Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 23:36

General

  • Target

    795cd15f3d62cdcb45a2c81f32a8a2625560d03be8ba6fd243e6d4bc9d8f6ff0.exe

  • Size

    65KB

  • MD5

    8b8b0ad3368180113e8be3ab7bf00db1

  • SHA1

    eafd15fb8cfed45b808538e42978bf1c2c041531

  • SHA256

    795cd15f3d62cdcb45a2c81f32a8a2625560d03be8ba6fd243e6d4bc9d8f6ff0

  • SHA512

    c2ae1469da0668afe5467df19b03c0de987a02b6b942bbf5c8755dfff9e37070cefcbfaaebc226210968e71cb43fc3fc5f960efcbfb35dc058b443a486607b12

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiA:V7Zf/FAxTWoJJ7TTQoQA

Malware Config

Signatures

  • Renames multiple (3721) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\795cd15f3d62cdcb45a2c81f32a8a2625560d03be8ba6fd243e6d4bc9d8f6ff0.exe
    "C:\Users\Admin\AppData\Local\Temp\795cd15f3d62cdcb45a2c81f32a8a2625560d03be8ba6fd243e6d4bc9d8f6ff0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    66KB

    MD5

    a9cceea515dba01859471b5d02c9e100

    SHA1

    d3a74bdc966b4f4b9fc4440fade94d8d4baa38f8

    SHA256

    2178cfaa65e4ef5b122d6894e7e250eeffe4fbe011c56d31b5a17adcc5b61726

    SHA512

    56b27637de1f56422ced7b3f2d1fa5a5506462d6d9566a31cf6fce73a1165660211269aef64806cd2814d247076821739b376dcf51ba823434d234a02acf2e81

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    75KB

    MD5

    bd8fb2930075f3297447ca21786eb364

    SHA1

    83915aea588361d24244d6f7d7c2982dac2a1abf

    SHA256

    37d1db9f1dc8bdf2f4e3b0a93c1cd27c39682de04280d115b23bc638819f3ef1

    SHA512

    084d23ca31845c0f658b968a40fc947447e7bfdfa1868f035850e9c823f78206f44042477bb2ece4380bb36cb2bd558df8e27b5f3eaf3e79dc1369370b33024d

  • memory/2376-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2376-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB