Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 02:37

General

  • Target

    c7e20af461712de66036149ba969aec0N.exe

  • Size

    36KB

  • MD5

    c7e20af461712de66036149ba969aec0

  • SHA1

    01b41a35535bd68ca6bd4e9fc1ec1e42c9327e1a

  • SHA256

    b15fb6ed5dd5f672d5187a4049fe41e1c18c8ec38c3c013f8b204ff881aa2aff

  • SHA512

    161d8e3db83d883eafde98c35cb0479097f4b766d2c7c38ffe94b9adea3f1ea2eca436af63c50b82817ab3e03ae041f377919b52b8c3f5856be0f72bb4fb9f21

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9ffgT+i1xrfgT+i1xtWzbHVcoN5i1xBzbHVcc:CTW7JJ7T5YXYibmRbmm

Malware Config

Signatures

  • Renames multiple (4683) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7e20af461712de66036149ba969aec0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c7e20af461712de66036149ba969aec0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    200265841e67811c68461b6d8868145a

    SHA1

    5a7a4cf25ed39117b7a4f5b8ff8d3106f401f478

    SHA256

    e255873a2a2123593406644217db6ed8d0fddb520e5dfee462aef7fda46df7e7

    SHA512

    ceec75e1a525e223279ed8720e2928f20937864c05572e5818acc277a6255a39b4a311fe12826aaa0b3cd023928471cad5aba043f34e642334aa12df707bcf4c

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    135KB

    MD5

    606680fc59e29b99226ff35dfa4a3707

    SHA1

    a86d251b99be5f1d46aeec72a1b44995e5167f13

    SHA256

    4d2a4eefa111fa34b99b6df59ac02b1d031375a6aa5e8cde0c8fff273b5ad776

    SHA512

    561b8032aab6296ffb15489bfdc47f5a98d125115b0544683a39c1b11843bb28eaa63d67a894503b7466a209ff24437b4690b7a3e8a8113e56fb40aa8e319984

  • memory/2248-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2248-926-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB