Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 20:31

General

  • Target

    2e47fc2f88d2a157cf6b2b25f9582bca57f9a936061f0c6a502b4d78d03790aa.exe

  • Size

    36KB

  • MD5

    9f1aeb2bb99c77c33a6fe5507e7e791c

  • SHA1

    c25cfc27ec7f1a8efe2f42d7d8fa94ee480345f4

  • SHA256

    2e47fc2f88d2a157cf6b2b25f9582bca57f9a936061f0c6a502b4d78d03790aa

  • SHA512

    d5a07fea36b74117bb95ada50661fc7ed1dc06a2d153b6544222a3adcd5a01086610c53eae26bee1745125cb6709f0b8d8ae3c5da68b6ed0743ab760510f3851

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiuhH:CTW7JJ7TTQoQuhH

Malware Config

Signatures

  • Renames multiple (3729) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e47fc2f88d2a157cf6b2b25f9582bca57f9a936061f0c6a502b4d78d03790aa.exe
    "C:\Users\Admin\AppData\Local\Temp\2e47fc2f88d2a157cf6b2b25f9582bca57f9a936061f0c6a502b4d78d03790aa.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    36KB

    MD5

    b92ed29295fb10a6b9bdcc1508301822

    SHA1

    632a915e9889d6b3c8a35fa121d35a5f4ccfa5e2

    SHA256

    1c80dea4238ef0cc5ec3bb1a31c0a69e5e17653f34b6b3035dc4cc8769f54e04

    SHA512

    a99abda72e00cab4560358c8ca205cf6913ef8f966ff236a95e3f4e668aa24a6c1e4f3cfc1dc9278a3dd03e813ec245264d8f20ac05880ec0e6261e03ccebaf6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    34cac31f0b11fb02b60f9c39ee9b772c

    SHA1

    23e20f19b89f351f20b55035a894a97165118499

    SHA256

    ad73e0bdf66a0771d98ed1cd4e1fe193f8f1c92037efa2c5db42a4a267adda4f

    SHA512

    4d9800b19aa05ef447d4ec218d89e7cf4c785196c8fe34d98ff07a50e27c02705ab7fa636e25ac6cb20a8c5330f0891ccbb753d4a28d07cd28dee1da9dbae82c

  • memory/2996-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2996-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB