Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 05:41

General

  • Target

    22bd1e810e86106c29e7d50e558d0780N.exe

  • Size

    85KB

  • MD5

    22bd1e810e86106c29e7d50e558d0780

  • SHA1

    82748748ccec06713e72707ba1206859277c3b50

  • SHA256

    9795c2c45110ae29c7512e7895d4f40c65c1b472549b75542c1c332faf6795c5

  • SHA512

    10ff9d44e4258081eba747c55186eb005e72ed7244afb83e5f180a60f64bf78c1f13bb7d648be97e6705233d7d628bc501b115e2d08bce0bd5aaa8c677f9ff45

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyoKIKMYTW7JJZENTNyoKIKM2:fny1tE5KIKQtE5KIKp

Malware Config

Signatures

  • Renames multiple (2918) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\22bd1e810e86106c29e7d50e558d0780N.exe
    "C:\Users\Admin\AppData\Local\Temp\22bd1e810e86106c29e7d50e558d0780N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    85KB

    MD5

    d0a20fa8618939d87bc1e7b2a7183478

    SHA1

    0d0819c6a84b83b644c8f5211101b579f8478f0c

    SHA256

    af46ede2a1eb6c12c1ed5d858e037a025773d6f7c5812632c6043ab943fd8ad7

    SHA512

    160aa50beec5be50c5f8443152728b65242d638f6b6a7633b36bb6bccd6d98882d1def8fe70f64bdc0607a935130fa4206f0a7285b93f8386a21a291151160ec

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    94KB

    MD5

    d5a96f1f9a61f94061dc45600b2e396e

    SHA1

    fdbb46f8e9d3d44f9607a9b085aac3fb74de7c92

    SHA256

    d3db740cd441925d3e24fdfac66f1a2a3f3fa1c89af5a848934b4d82f8226705

    SHA512

    ac60994ffd6ef0ebd9d09158fce944af0968edba8243e011e09d2b50767091ca41673334bd77ca484d71a52b3c7e058481a4c32fb8b67ccb1f87616c0ac5e736

  • memory/2964-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2964-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB