Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 21:57

General

  • Target

    1fb58a80028c62a6dc9b3359e1b02850N.exe

  • Size

    30KB

  • MD5

    1fb58a80028c62a6dc9b3359e1b02850

  • SHA1

    44e3808573f6f821bd3fe0d4fe0e9ecaa09a339b

  • SHA256

    d0402cb26e1a4e4c67578681c28639a5fc37f2485838d7600f1d6dfaa8bc7bf0

  • SHA512

    49c06a480c874af8cbb2ab81ccd322c1147465668df8de61b22494d29f48602c8329eb6a42fb516041185091dc95c04e9b1e0b011a95a67fc4e1755ead183930

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeHhli3:CTWpji3

Malware Config

Signatures

  • Renames multiple (3444) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fb58a80028c62a6dc9b3359e1b02850N.exe
    "C:\Users\Admin\AppData\Local\Temp\1fb58a80028c62a6dc9b3359e1b02850N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    30KB

    MD5

    9630de694a7878789a05e810373fafa3

    SHA1

    78f72e71010d3abad0fdbb5090f635aec55f243f

    SHA256

    489865157e209408ffa843e93593bac4ae911ae53a1125f5c42ad8fd1275c654

    SHA512

    8961b1c89008a38070a5bc974efe41a42c1e52df9055710dfaeea756a482c834b1d8407a614bfa6620dcae4984dfa4765d7cba9b7dc2d09e0fcd5583a91a0fb0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    39KB

    MD5

    9898f663b4469901f2f78a6f590153b7

    SHA1

    3179e8b6f124c6248a6748436606f1da99fa6102

    SHA256

    242e100ad9b6462cd72b32aefc1902197144f71e94f8ef8b64a4edd11230d303

    SHA512

    9584b93ccf39a7ac6087aac47a754a5efddb8cad737a2a61c8d905a555bba3616c0f67c567d7bd4b770e75040469a5e9d308abbe9434f2aaf622dd524715c86b

  • memory/2628-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2628-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB