Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 18:41

General

  • Target

    09ad75a6f9b39635787107053be0ec9c447de01cc1c5f0f677b09f09b74e48ee.exe

  • Size

    91KB

  • MD5

    17312f4f97bdc161606969ea50ac6fa1

  • SHA1

    22da43de05253af147f39d8e402dbd9c33ab88fb

  • SHA256

    09ad75a6f9b39635787107053be0ec9c447de01cc1c5f0f677b09f09b74e48ee

  • SHA512

    9b837ad10906b1f7e9e54da52a054e3b6cd1406048c9488aa3c0232ddff0efca8ac3c04e6694c1fd100a7847f0f59d82e67a794e85d01f3389e51c0712f4ac0f

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TTQoQlR1T3qAqK7abHJZKS:fny1oRlR1T3i1ZT

Malware Config

Signatures

  • Renames multiple (3478) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\09ad75a6f9b39635787107053be0ec9c447de01cc1c5f0f677b09f09b74e48ee.exe
    "C:\Users\Admin\AppData\Local\Temp\09ad75a6f9b39635787107053be0ec9c447de01cc1c5f0f677b09f09b74e48ee.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    91KB

    MD5

    c63784cfe59b8bc6e07c1f9fdac41cd4

    SHA1

    3a9513c9474beb518c8a08adef3bab9518f8d964

    SHA256

    75837ba5fe3ed406367fdf3caebf9478a9795c89cb2a0c03c1d77976e70a907c

    SHA512

    1189be5f1923ef00dfd5ee72c04c0a06c0088ed779b509cdf192abb57b4ec99a33a6acfd48aa77c89ffdfc2d66949282368ab9d76d2e9b88a57feeff70606f13

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    100KB

    MD5

    7f16298786f35e39b170ab5c5f90b7d0

    SHA1

    a1217b4300bd8c8f40785e381578458f95dc5115

    SHA256

    3f1fffc9ad797306b6abdd44d2cd2ece8eabfbf72cd0780838478687f70e18b2

    SHA512

    09eb71d03da18168e8b9a96d6a3fd89af48b6af97514008f61f74f449de97b7a89e0b82f8ac1ed619252685057bb39eee0df5ce5fc4bac5a549e022b60ca4afc

  • memory/1296-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1296-72-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB