Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 03:49

General

  • Target

    daaae1094078d6d41eceb1f12e295cf56667d9244561cd360d8e504f3be0b373.exe

  • Size

    564KB

  • MD5

    a12e9f77de0d2b6c72af7b5d8a8b43a5

  • SHA1

    71e752df058273a259135a27ec88222202256309

  • SHA256

    daaae1094078d6d41eceb1f12e295cf56667d9244561cd360d8e504f3be0b373

  • SHA512

    f064675cc8b6a034349e6168b6186c5c31a32ca908f2956e6a0d66234e292a42f4f6733245f8c3db49cea94719ec2f3c880f074e86dc9c588deb66183219817a

  • SSDEEP

    12288:HRsJOPMdl5b/wn0Z147JaYCT77MNXYnno/2p:GRxnrF74Yo/2p

Malware Config

Signatures

  • Renames multiple (2013) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\daaae1094078d6d41eceb1f12e295cf56667d9244561cd360d8e504f3be0b373.exe
    "C:\Users\Admin\AppData\Local\Temp\daaae1094078d6d41eceb1f12e295cf56667d9244561cd360d8e504f3be0b373.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    564KB

    MD5

    44ced6521a926911725041a87a8495bb

    SHA1

    5969861802f05808aaa18d56d3eeb2787d7d5a15

    SHA256

    97bdf9c60c7f118e70b0d396a76774a4797860a43d090e5c7c424cf8f0cb0cde

    SHA512

    294a7f4fcf1a85a4ccf39bcd77091f558d856565470962225714af6293659f0c6981e3a90c6ddfd118dded2a529ae6cf262ac68ee5d2bf1f22e0c1817467013b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    573KB

    MD5

    11722428de120d1b0e41971c7ccce9d4

    SHA1

    0a4ad92c94bd85aff9d78ad9ae836ede4325a022

    SHA256

    fa293737b08d2f3d89d0f42717460396948e6f4d84b74f8498e52b32221787cf

    SHA512

    1ede8456e06cba74e7d5fc918660c16c7e77fa32e5c0fa8db060e1ce65d538750c587fde6273c9116860e5c8655b2df5c6af693c5e792e4cc94e3f5827faf38e

  • memory/2088-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2088-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB