Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    24s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 14:55

General

  • Target

    779c75678a9e7eafdb8893fca11eb870N.exe

  • Size

    27KB

  • MD5

    779c75678a9e7eafdb8893fca11eb870

  • SHA1

    71c72ffe8454e49cba2ffba1ac0ce6dc357b1d0d

  • SHA256

    86e589fcebef31711c7dce1c9fadeac9646a7bd40ac2253b3fac2f8f3baf4fa1

  • SHA512

    427ee33a96ee7d5d5aeff57efd3ef81e61fff8137cf40d943eeadc68b45137c74950a490ccda43943d4cfdffb05c62c8126bf7e913d0f77a99e9f5dd5430cd72

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9bJSsJSNOnOH:CTW7JJ7TFJSsJS1

Malware Config

Signatures

  • Renames multiple (3336) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\779c75678a9e7eafdb8893fca11eb870N.exe
    "C:\Users\Admin\AppData\Local\Temp\779c75678a9e7eafdb8893fca11eb870N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    28KB

    MD5

    43c37c44ed859ecf329cd97101296895

    SHA1

    e559c0bcd1454886f55d7ed11b3af0dffaa416fe

    SHA256

    9911c3506ce3d4a727a2eb52f6659003215623191fd8a01bf52f87b7254c5e86

    SHA512

    674514e1340487531a0b532c94d85c9f73d4e01da9fb05fccb8bdbe355899a873fbf2325acfe45c791f2850988cca04924db8fa7d41c4fba36a4cf90cde5cf88

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    37KB

    MD5

    51e1b19d0ae606cde89c7f83a34d1bab

    SHA1

    fd5c49e700de9d6f8498622f73224f7ea5f42c3f

    SHA256

    bb1faead39c9a571dab3d222686fea9e30ebdb9c502ec77592beceef2e910749

    SHA512

    4b92f038de8ddb3ceea3e3311a0ec1db9657da1767c18166d3729962432a1ab6e4b0cb4be14bb1aad575ff37712fcaf17f54fa67628eea73d1f18528546a239f

  • memory/2748-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2748-71-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB