Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 22:50

General

  • Target

    3d26efdb4310013daf30862d873f7760N.exe

  • Size

    38KB

  • MD5

    3d26efdb4310013daf30862d873f7760

  • SHA1

    de6f41ef52bea70c825ad1bb60ac380d0633781f

  • SHA256

    ff22590efe135b2d41f93782e3cad4c7f4a5c62a2b60a2fb8a3c185b10fe11a0

  • SHA512

    1dd39a931ee486c1f06026b4233f17b9fd1113987a0f4f70582a7544ede7cfd6571c8832f4baa1c6d4aa9b7708a794c9d74419d032a39b22ea349de35a2f1ed5

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0m+s2BGUG3oxoYM2Mj:CTW7JJZENTNyl2Sm0mKQ

Malware Config

Signatures

  • Renames multiple (3317) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d26efdb4310013daf30862d873f7760N.exe
    "C:\Users\Admin\AppData\Local\Temp\3d26efdb4310013daf30862d873f7760N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    68f5d9a92e78d5eb26eea96b0b59161e

    SHA1

    e414bf98da577a792f7699664dfa477179ab614c

    SHA256

    076eb0409bd7144d3d55529eb735800f7bc21d414bfed5526e3c146335c24a81

    SHA512

    eedbd06f05d33c2c3b291d41df20bf960a06de2e2858da6593995009f71d5ed3c5f07907f2ce68628661e4b8d3aa8a6a48d4bfde487ebd5dcaf4f71f7bec6722

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    3c0a63426ece3df46f41c42f32f0f693

    SHA1

    ea1ced1db425ec4570e98cf8850c5356f067c714

    SHA256

    be1430824e4faf8ccf9482d27b5e6dcb8f57d9bd96bbcee4bbe24fced8886c1c

    SHA512

    831ec49490b51a0498c3f32cc79720e20839ecc94ebbb4355dcb878b3e897bf731c18ce0d505721c5d5290f3f952991f76ab0fe581785c38f4d3c1357dcbeedb

  • memory/2400-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2400-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB