Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 23:10

General

  • Target

    a2b97584c82c862a25aa76e658a621c0N.exe

  • Size

    29KB

  • MD5

    a2b97584c82c862a25aa76e658a621c0

  • SHA1

    54da3dd6bc7a48b79a989705418efad20da9185e

  • SHA256

    f486564239441eeb454c3d4c918df81f7613080220c31b5d1cd495d3c28ba8ae

  • SHA512

    e83a5e98515dc0a4a1d009ba56412bd6e0b34bfdaba74da529cd53123c066269961ab9ab32cf8c644ff3e07e40ff0770b57148d1347e27684341ce6c70bcbd8b

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI99ui1xDui1x/:CTW7JJ7T/F/Fz

Malware Config

Signatures

  • Renames multiple (2842) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2b97584c82c862a25aa76e658a621c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a2b97584c82c862a25aa76e658a621c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    29KB

    MD5

    ef4e7bc9a38b7ed6e2d9e8e5916f9993

    SHA1

    c49ad7a3242e9a7c19786e7f2fdac6211c8c5333

    SHA256

    df556accd6d444d95aa9996affe1d3c011595efc92c2bbeb2a30b833c83dd883

    SHA512

    9f6dab59d66e5adefe08f0e106d7d631a9edc2cdf7c48468b4b064c97636f7393593266629a508d0380549e492afecc2bc354735ce017a53fab721d231a7fbe0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    38KB

    MD5

    158ee950496ceae76a10b6f84af98349

    SHA1

    c15f95dd237271d5c28848a0bda4972d4699b41e

    SHA256

    31aec38751afe16fdeb73e21b3e0982b50593f9533c0d7c50b35d9172d305475

    SHA512

    159028efe3b9fee0756c66359f1a282e7e800fd64eff161cad5fe3853c118b1fd95bd6edfc1a034178f3d8e3308b494c542813f5d62390952d39b0f96762afaa

  • memory/2704-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2704-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB