Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 06:18

General

  • Target

    fd7d7bc00eba0317c3b07e6b5a8a55999407d35b624a0563a53f796a82619d9f.exe

  • Size

    34KB

  • MD5

    bfdf703005ba78fd9d6d10245e84fc6f

  • SHA1

    62defcac18f34c2d91f8da5bf6eb41610cc2d6c8

  • SHA256

    fd7d7bc00eba0317c3b07e6b5a8a55999407d35b624a0563a53f796a82619d9f

  • SHA512

    0ac59addac8ca91bdcc9c03691b523d75e35090f8aa9b01abb2a701c3f189bf58ba0397443f4f2e975efcab53db75e995054824e5505238e83c8e5ed3c337b3a

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJ59ADJs3353e353L:CTW7JJZENTNyoKIKMO

Malware Config

Signatures

  • Renames multiple (5274) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd7d7bc00eba0317c3b07e6b5a8a55999407d35b624a0563a53f796a82619d9f.exe
    "C:\Users\Admin\AppData\Local\Temp\fd7d7bc00eba0317c3b07e6b5a8a55999407d35b624a0563a53f796a82619d9f.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    34KB

    MD5

    da71081266c5e26516f75d31819f86b1

    SHA1

    09a0a4df7dd16be17ba4bc66b44371f50736deee

    SHA256

    fabff1afe44ff9ea1d7c66c88099efb78c42fe97f395b63e9c90eb71c159ea8c

    SHA512

    66a93cbf466fdcd4d56f5c2e677c11b10f95fb348c875daccceb266f9af860640fe426bba764dd392261e8eb3bbb7a95d45c35c86e5e4edb1295b04548c7baa5

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    133KB

    MD5

    cfcfe81986623f793485c6c6f9d09342

    SHA1

    99673fe1a57e5305284f48ff693b7673bcacb89f

    SHA256

    6015ffa3f32909422169e4841a0dab0fd96c2c717ae1c3f93409871f170f8b78

    SHA512

    f2ecf650a9faa0bf3ce0b373d15a50834ed533ae40e3c46aaedc572f020e51a21da9c13e2884c6186a7f3fa3698203ec840fad6ce963d9afaa883980d74dcc0a

  • memory/4204-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4204-1008-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB