Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 16:49

General

  • Target

    a419c693e21e02cd4036836f87ba0960N.exe

  • Size

    33KB

  • MD5

    a419c693e21e02cd4036836f87ba0960

  • SHA1

    16fb778ab3c8764f12904a5d7a2ef828a63a43e5

  • SHA256

    8254f15ef51013017f7486b5e99f067c0855ccfde7e910af13b9e6d0a4329fa5

  • SHA512

    201e79647d1de0a4d48c761c018bdbea44accd83c30d7fae5bd3785642b5e1596c9880952befd139144c83b1d83799f656d83dbb7cdc0ab910eda26ae23f2c2c

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9cGsGJKO:CTW7JJ7TyGsGJKO

Malware Config

Signatures

  • Renames multiple (3456) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a419c693e21e02cd4036836f87ba0960N.exe
    "C:\Users\Admin\AppData\Local\Temp\a419c693e21e02cd4036836f87ba0960N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    b8ec39336836c3da640f77f2eff6626a

    SHA1

    94491bc49ff99934cc33a95a6d7869fac2bad43c

    SHA256

    673dd97942ae6ab9514f941c91d6449e7f38512a71c9b0dc55f081218c4dc13c

    SHA512

    1acad2ddcdcf0bb2d06b7b5cd9e78ef38ca9a0a4cb0c6131dba7b49d968be5cba15f5424af0306a2eadc94091fe8b11006a6fecd5889ecc3c6cdaba486af1578

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    42KB

    MD5

    56b25a01872f52ff360d8da8fc788ab2

    SHA1

    a0d33e1c43c6354f4f73dfbb4bcf6cca760ba971

    SHA256

    ae5ca3d5a2de1f2aea48c85deaca147f9155c5095fa56ecb4e1953a42889fdbe

    SHA512

    991e4ef047f595aed9110d12890b1ba4741ab8f62147b4fd97df7524044490811f46833c93e0536e22edf2269f1570e49c46628c227fbf6ca37ffdd119563724

  • memory/2692-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2692-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB