Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 20:19

General

  • Target

    2a849c4e201e81227d12e92f3b5bb61ea100d0cbf56ec3124483e3aa489ebf74.exe

  • Size

    60KB

  • MD5

    8c206fd98d3820b7dd8ab2f93133ec27

  • SHA1

    b449d376e0b29fb0d7242a23ad63461c23f3645b

  • SHA256

    2a849c4e201e81227d12e92f3b5bb61ea100d0cbf56ec3124483e3aa489ebf74

  • SHA512

    27655715463475f024232a4fb8eacb19d9d0398a4c1649f368dbe55df5b45135373ba9d6ba69d6d3f1f2b38d67b7f5e7a59fdfa3a3ceb177c584f6408c0164bf

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9qW:V7Zf/FAxTWoJJ7TMW

Malware Config

Signatures

  • Renames multiple (3625) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a849c4e201e81227d12e92f3b5bb61ea100d0cbf56ec3124483e3aa489ebf74.exe
    "C:\Users\Admin\AppData\Local\Temp\2a849c4e201e81227d12e92f3b5bb61ea100d0cbf56ec3124483e3aa489ebf74.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    c8359bb8c5ce96032997523c5e1552bd

    SHA1

    eb370890501b882fc6d69361bf811b2c7e3e85c7

    SHA256

    1604a41ca70c5372077463eb66580d28b566847b0c51ebafaa757fc1aaee29ab

    SHA512

    5ae175319d00023064d7356ef2dd06f3e74a1cbcc2a1e9538d3929f9204ed6b39a6e028dad1bba890efb943d15c66201fce02fd5992a50dad6099e847a65dcb0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    69KB

    MD5

    1d35a0115231823ce1327ffd67efb8f9

    SHA1

    c62d52b49c5d4f8dae988196ce644544e961f4ae

    SHA256

    f91d4a1ea8c620519d186f9c91f611cf6680a5df56fe106c8e08c66bc0267051

    SHA512

    57460385b40cff70f140dce7bf6ff74d6134aafc201362464ae9ac388db1553a637558521c9a9d35928e1410227723dfd8374f608f216ef54b43cc0f93337b9f

  • memory/1716-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1716-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB