Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 23:42

General

  • Target

    7b481963e03f7fd470ad15abb3dc19b897efb7020e2f81c0f8177a451d7fdd52.exe

  • Size

    57KB

  • MD5

    818b14559fca63282adcdfa8c9a2166d

  • SHA1

    a3b9e25362c4b4d9af991268c55e6df9867a100c

  • SHA256

    7b481963e03f7fd470ad15abb3dc19b897efb7020e2f81c0f8177a451d7fdd52

  • SHA512

    4e4e9b7caa7018d7ece91930818e6ec1c705f80722d708f070a8d337e43b187a67fcdd4e98bc163bed2059dab497aec1f7f1779b9f209f6129e9d9a17bc99fac

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9HxAQwC:V7Zf/FAxTWoJJ7TAQwC

Malware Config

Signatures

  • Renames multiple (3746) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b481963e03f7fd470ad15abb3dc19b897efb7020e2f81c0f8177a451d7fdd52.exe
    "C:\Users\Admin\AppData\Local\Temp\7b481963e03f7fd470ad15abb3dc19b897efb7020e2f81c0f8177a451d7fdd52.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    5e1214c01d2528bd6aedce23e12409c7

    SHA1

    3c51c6c9f76b5d3590a688cc60eb24621d07ebf2

    SHA256

    9d1890261d123a4c7591d6697bb37e492ff13adaa8f5f2e4e1050517976aa029

    SHA512

    244d1961dcca1a242ea1f5bea1f1c2283d6367ed5e84626436eb0356460453b47718680f5108a0584bcce09c2b2e3b140426c44485fe3a2c66fda654f930aaf1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    67KB

    MD5

    0f9eef46057139f2ee078ee7dc2e7777

    SHA1

    0a09a758d14017bc0bdfa05017c89323fc5b1c15

    SHA256

    c0235484f5b66160927a0ece88bc5048fff7a55423a0070411695331f2955e89

    SHA512

    1b972ec010172b86dc58f56eddd7618001d8911cc7b5d62f908229ac407e27772c9ef9bc6a1d42eb4687b52b47df83ef17a660ef1cdfbdcc87a845c942f7ba98

  • memory/2348-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2348-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB