Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 04:47

General

  • Target

    ec6bac424b6f881860688884e4478216536f1720226f91f5f8a60403239759f0.exe

  • Size

    37KB

  • MD5

    36f5fe9bfe7e7032efe57e08a0b7637f

  • SHA1

    b5241e7bef7ee5c1d9a8cb387b3b22bc16729ec6

  • SHA256

    ec6bac424b6f881860688884e4478216536f1720226f91f5f8a60403239759f0

  • SHA512

    1872e1c53558bead122a43a0e40be3c88937c42973d983fb8b38d09ca78e43b7b45ede4194ce639547a542f915df3049ebc970ae70edd4ebef33bf1093666ace

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9NCQy5vhgCy5vhgw3N:CTW7JJ7Tugtgw3N

Malware Config

Signatures

  • Renames multiple (4000) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec6bac424b6f881860688884e4478216536f1720226f91f5f8a60403239759f0.exe
    "C:\Users\Admin\AppData\Local\Temp\ec6bac424b6f881860688884e4478216536f1720226f91f5f8a60403239759f0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    b31f22025557465ea626c957fc2df26b

    SHA1

    4feb06bb6f660ec9cf53d3a797fd9982945b814f

    SHA256

    1b41888e78a944c0896469eb89af68f9f0a7a695f51c94e233afad839dd15f7e

    SHA512

    e2f0596313c91b0251b4bd0d3a040e7796a64f95b3b5f6ee3693a6f115e538b7b59f742b2cd8ac0e7fea30c42efdb31f26db537773145ef0dad079194225ee2c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    46KB

    MD5

    09bd92766115f378ef7506e0c79e1f31

    SHA1

    5661e61925c950d0d956f04c8958422a58555e56

    SHA256

    666ade594089dd5073e4454704fb3399d45c7eea2afbbf7877ecd3d263917170

    SHA512

    89e63c65a2b71af2883d7cb4644e51c592ace950b36707da46c864caa05e5ebd24fec08dff734fb835904029ef81e0178b13a9baeffbabc5224617f04df798af

  • memory/2668-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2668-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB