Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 23:04

General

  • Target

    65cce924724181c242ed0eba42a7349427c8755bf05062ed4c8545e8d6734534.exe

  • Size

    135KB

  • MD5

    15224376f934dc4b877e1be74c2e43f1

  • SHA1

    9adeff3131e01fabc73b118994a1b2f906fa8016

  • SHA256

    65cce924724181c242ed0eba42a7349427c8755bf05062ed4c8545e8d6734534

  • SHA512

    52d3fa27b80982736638311b1bcb8e1686216a4aba59a4daf32110b47c7876baf4f3223a886d3eb5a438719f2300971d2501985d37aab254db08e29b43c96ef2

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZTnTWn1++PJHJXA/OsIZfzc3/Q8IZTs:fnyiQSo7ZPQSo7ZA

Malware Config

Signatures

  • Renames multiple (3451) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\65cce924724181c242ed0eba42a7349427c8755bf05062ed4c8545e8d6734534.exe
    "C:\Users\Admin\AppData\Local\Temp\65cce924724181c242ed0eba42a7349427c8755bf05062ed4c8545e8d6734534.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    136KB

    MD5

    af048b860a37d258b22cbb71e18af729

    SHA1

    0f67eea6786dfff69201d5e71e8b853702f26805

    SHA256

    3588054bfc193dd1c90c61b10479d000392f9423ad29c7f2383e78459fa69377

    SHA512

    54f04ef0327d4217e42a0ee5bbf0ffa2189e46b2fbb462ccf87ffcf38dd1eb7d5497db0c7d125f2386d24c99cab3fb97272e04b67f2223206b40e222f38bdd46

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    145KB

    MD5

    0b88a4ac8867536b7ce58ed15985e7a8

    SHA1

    27360824cccc3e0d66641de5426f628967211d46

    SHA256

    03b60cb14ecdb3b405ebaba1a97d6f9acba1d0b4e54087b91f74632df3ed592a

    SHA512

    70905a1ee1558fea36f65b7ecc3518517772ba5ee943bcb3947b5e12d04909a9de3f23a25584ea7b220efaf77f0066a8fcaf3ee8ce6b86f5e20cef26ac878a79

  • memory/1500-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1500-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB