Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 02:37

General

  • Target

    c7e20af461712de66036149ba969aec0N.exe

  • Size

    36KB

  • MD5

    c7e20af461712de66036149ba969aec0

  • SHA1

    01b41a35535bd68ca6bd4e9fc1ec1e42c9327e1a

  • SHA256

    b15fb6ed5dd5f672d5187a4049fe41e1c18c8ec38c3c013f8b204ff881aa2aff

  • SHA512

    161d8e3db83d883eafde98c35cb0479097f4b766d2c7c38ffe94b9adea3f1ea2eca436af63c50b82817ab3e03ae041f377919b52b8c3f5856be0f72bb4fb9f21

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9ffgT+i1xrfgT+i1xtWzbHVcoN5i1xBzbHVcc:CTW7JJ7T5YXYibmRbmm

Malware Config

Signatures

  • Renames multiple (3452) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7e20af461712de66036149ba969aec0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c7e20af461712de66036149ba969aec0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    6057a8b78e804d0fcf8c5317ce7fffec

    SHA1

    72ec112cee7393c33b8be2c7bf7f0e94163068d9

    SHA256

    d50666dd7d52c58a5c5892af6069e0a206f2d9a5342229d74159be475615318e

    SHA512

    27ea868b38eaf4704a0069eb3a25812f7aa965069978d0cf4363363d729f4ae2ca6bca05d4eec9e345983abd76524436f569d22621d8cf5cd4ec00378283c42f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    e2c2b4b952f548c7b9ecf71f6bf0bb95

    SHA1

    b6e6815bb730c60691237a34f154bc639b77ed3e

    SHA256

    10cc394b10be2ba1704ebd10ebbf19fdb75feb5c93c153844f3794a34b169d7b

    SHA512

    9b8347b6f2d83ee0077c0e0258dcea8f3a63eaacd4c0a92cc7d5d33c558cf9f66bd129d5b9c4e4d5b3d2ef5425913d1b14164a12e74a2360af5263155f8f840a

  • memory/1848-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1848-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB