Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 13:25

General

  • Target

    91af6d4c720287ff4689db2d1a000310N.exe

  • Size

    31KB

  • MD5

    91af6d4c720287ff4689db2d1a000310

  • SHA1

    911a1ceee67326bb88f25442444f5dbdb3a55a00

  • SHA256

    5e6d62e28b5f39944528ef40d708a06ec10924c24fb2714dbb67bb189f9c5651

  • SHA512

    8698192f9b6b33950939081d0729440af0ec4faebf56930a3a6ad630e57c9df263d537bfdfb3dfb0c6c5d7ab2d7c53c6dbf7731af190232229ca94989562dbaf

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9B0Q0/C:kBT37CPKKdJJ1EXBwzEXBwdcMcI95rv

Malware Config

Signatures

  • Renames multiple (3372) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\91af6d4c720287ff4689db2d1a000310N.exe
    "C:\Users\Admin\AppData\Local\Temp\91af6d4c720287ff4689db2d1a000310N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    31KB

    MD5

    d71616bd0e8d7d066d0f2ea4ef330a01

    SHA1

    da7fb7f26b544f21b019a6d3f9ef1c62d801fa09

    SHA256

    5f2858ee3e1b14063cb055c5d681902df5addf67330a8d03b7ceeb4fc5cb4c31

    SHA512

    03f4e64a62fe15606884744657ded5d9eac1d07f429f0411cc86bea94ad37600d8f5609a1afe93905e487b3cdf890d495b79bb1e27c5e974f12cbb0e003ff097

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    40KB

    MD5

    85cc991028b40db2d4e7b971ba724fbf

    SHA1

    d63fb688e6be64ca28506df82ae26e4c7ae3c57a

    SHA256

    e8ed757da338e94934c8838f8138dd5202a5eb2f521408dbdfc12e5769aed20d

    SHA512

    4c2e479feaaeb07e16f6c0a6a67bb5cb723594c312846821f125842173556feeaef8d6d033f837b1043a26a85000391ce4351b0d0ae881a02d96807741ed5a82

  • memory/1148-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1148-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB