Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 09:04

General

  • Target

    c71836b42b863b16bc24c2d89c781cf0N.exe

  • Size

    42KB

  • MD5

    c71836b42b863b16bc24c2d89c781cf0

  • SHA1

    e7b2a1d5567fab4f4aaea76e2123927c3ac40f4b

  • SHA256

    29bb1b6879975ee5bc7fe659a02f9d73f57d2a1c889b808aace3e38a85458ae6

  • SHA512

    37a457f9561ecc61f0e7dc22974b9db933477de2164f73e7cf4425d2ce213ed28cb03fa23df4f35e3f8a96635d92fd19784816e8aba991a95a65dc03b82c2532

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiWkjktJwxJw6:CTW7JJ7TTQoQWkjktJwxJw6

Malware Config

Signatures

  • Renames multiple (3378) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c71836b42b863b16bc24c2d89c781cf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c71836b42b863b16bc24c2d89c781cf0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    eee3966eb0581ff32b5dd7f15c96b01f

    SHA1

    fce97b4203d7a8f405572a110fd4eb4b0e76a8f8

    SHA256

    28b77aca46ff98b3d80a5696b4f242f31d37b8bfa38a823da2926cd5372b8008

    SHA512

    88787fa813dfc704b08f500053ef0f777160383031be6d2a6f859281556126ed4a18980144a1efefddac9de2ac455ee53a65747212b07d19527337138c8bb5ce

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    004afa768d12650512b4c8e49674939e

    SHA1

    727faed3163e29603e9e3d9dba95aaac5e1e2ff5

    SHA256

    4c249a1816a35fc9287df1006bebd22c03af67dbdac151f1629ae2b32d2ddc3d

    SHA512

    c9c7786157c2c8a62cd8890d546302b87bb32d051ecf1abe453aef9baa5566eab3e8e1cd74dc6db8377d74e486d041b8e8c9438baf7f339f98d3a6bc9fe2bf3a

  • memory/2444-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2444-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB