Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 03:05

General

  • Target

    96ed70b101861a208d38dcdf14b43a70N.exe

  • Size

    40KB

  • MD5

    96ed70b101861a208d38dcdf14b43a70

  • SHA1

    5878701a25331c9307bd6e1d3f4bd0e4117d9c5b

  • SHA256

    6505dd3e50f9fe8c4ddeac13840ce67d0bde8c991331bd30fd94d3cfffe99255

  • SHA512

    85e90bc1ace44c624b912e2d9a267d1411f49b7a37550c86a68dcaf240fbbd9c3f6012bf4d34fae06ba0ff1f656613fe6e81a76cda4cb9487ae86bff42656443

  • SSDEEP

    768:kBT37CPKKdJJBZBZaOAOIB3jM2jMO/7OSbo5+Oi6Jfo5+Oi6JvEXBwzEXBwz:CTW7JJB7LD2I2IbSq+P

Malware Config

Signatures

  • Renames multiple (3440) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\96ed70b101861a208d38dcdf14b43a70N.exe
    "C:\Users\Admin\AppData\Local\Temp\96ed70b101861a208d38dcdf14b43a70N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    dab86ad1968e3bc19d64712ee201f318

    SHA1

    f10d042bea4f3fc85ae612ef54b2c71db960600f

    SHA256

    dddacc91a295ab3f842284c7ae2658db1494e48ad4a06abf1c7731c21cbb5ac1

    SHA512

    8fc921dccd47c47dea7474ca03e94aa2e0d03bea0af847f5c7779e94a7079fa9616fe7fc00126c7809576c04515284ccfde9e9a66a9cd95fdc456df4d2bf82f6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    78441086279dd0876a71a39a0fd63418

    SHA1

    bb8ed0f63f36198c3b38cd1f2efe4579aaae8511

    SHA256

    064faf6091bb4c67c9ed5e3f351263ab032f59bdf569bbda8611df4ee847b212

    SHA512

    87329256a2097e6473707763af7a2683b3a41cd82cf7c417aabedeb0b62ceb34ed6944a05ad98e6704ea69fe531b173c1127b25cc5419dde92d5eec54ef2cd81

  • memory/1956-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1956-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB