Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 03:13

General

  • Target

    bc1b112f9079336c7356beb89ea86eb5a060ec0ad47fdb8b2e098fedcb5529de.exe

  • Size

    62KB

  • MD5

    6aea76205d140b71fed6cb7b041eb8ab

  • SHA1

    22d59a90cfdbb53b3496b71593dc290154ca3f67

  • SHA256

    bc1b112f9079336c7356beb89ea86eb5a060ec0ad47fdb8b2e098fedcb5529de

  • SHA512

    021c54191fde31505b0902ae3ce1bece07d4332887ecb9c33f1452b2c7008ac187938749322beaa71a64da964b05fb8100849b5b7f5415b2eb889c5d4600efa0

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti2Q8Qw:V7Zf/FAxTWoJJ7TTQoQ1fw

Malware Config

Signatures

  • Renames multiple (3694) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc1b112f9079336c7356beb89ea86eb5a060ec0ad47fdb8b2e098fedcb5529de.exe
    "C:\Users\Admin\AppData\Local\Temp\bc1b112f9079336c7356beb89ea86eb5a060ec0ad47fdb8b2e098fedcb5529de.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    62KB

    MD5

    f261b1fc08f7d86e3be29cf2d0a05c6f

    SHA1

    318090bc9fcd147e91920ccadc844b7598004329

    SHA256

    e84af073d94f400b799d80787446cd8d3cd21b9980d5d631851732e8b84a5f29

    SHA512

    c719702db7d23621b14c281bd6ae6ce1d807f7b58103506d101fcc4f688540a809fde547541c54a57ea7cd6e7cfb249ef546a7590ba2ec2bf3670995f77c3bcb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    71KB

    MD5

    2d957b38c5a1939ac8774282b6030cde

    SHA1

    b566cfa1f62c9f8b94b0608e0c3697647e72e7cd

    SHA256

    49ea540e001b027d201a6d9e5f3feb78ea88a186ae2f77178558e0a7613da6fe

    SHA512

    a578bc6194a7ed64efbaf02a2d64067b06a43d25a6524b79de3ff456e779c2a5eb3f39a04532ee083b6fac8835ee213204440471f3e639a32eb9f0b7a8bd202e

  • memory/2484-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2484-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB