Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2024, 20:19

General

  • Target

    2a849c4e201e81227d12e92f3b5bb61ea100d0cbf56ec3124483e3aa489ebf74.exe

  • Size

    60KB

  • MD5

    8c206fd98d3820b7dd8ab2f93133ec27

  • SHA1

    b449d376e0b29fb0d7242a23ad63461c23f3645b

  • SHA256

    2a849c4e201e81227d12e92f3b5bb61ea100d0cbf56ec3124483e3aa489ebf74

  • SHA512

    27655715463475f024232a4fb8eacb19d9d0398a4c1649f368dbe55df5b45135373ba9d6ba69d6d3f1f2b38d67b7f5e7a59fdfa3a3ceb177c584f6408c0164bf

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9qW:V7Zf/FAxTWoJJ7TMW

Malware Config

Signatures

  • Renames multiple (5194) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a849c4e201e81227d12e92f3b5bb61ea100d0cbf56ec3124483e3aa489ebf74.exe
    "C:\Users\Admin\AppData\Local\Temp\2a849c4e201e81227d12e92f3b5bb61ea100d0cbf56ec3124483e3aa489ebf74.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    c4a73819aca172b68572a99e3f204078

    SHA1

    7a2c62faefe99ae79e0b29719a1710aa415f0b18

    SHA256

    df120613253adff496b42590e4521702763dda9783c47bf34985300565741a99

    SHA512

    a7a8107de3ea4b5d85ba4386b7efeedf5b7cb97d7c119639d1cd4858e83984bfb40e70cba996d3e7e84189014e8483349a71997f56177c80c44742687d277a62

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    159KB

    MD5

    b5ab30698fed0eed241308ee1ffdc496

    SHA1

    f6b66c01bf1fe2be96d4f9d8c31e76138e4399bc

    SHA256

    096358eba3c763630f3962042ff06beabc94682f49fb67b54bb9ca8af0db282d

    SHA512

    28696293e106b30d7bf87c230c13642b2fdd1099fb4993a92b425ed1e5a9a1f180c2b5e84fe281f505ab6fee84267661ff91b95d33c2f3fb79a10a57062fe3f6

  • memory/3528-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3528-902-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB