Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 06:17

General

  • Target

    3931ab173fd83144e591fe8767baa710N.exe

  • Size

    88KB

  • MD5

    3931ab173fd83144e591fe8767baa710

  • SHA1

    6ea23fe9aa7eaf6cdca175d740001f7ae5b9d60e

  • SHA256

    45a007b67413484340ed8624b66b71e33480fef4f411dd83b137898923f3892e

  • SHA512

    8d98a4fa0c89379f3d06a6268ae1276c61c8d05bc17945200e2a09c443dfb55aff71d23324194811599576188bc90f64179d89716e01fdc767bbf14deda68aca

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyoKIKMTTW7JJZENTNyoKIKM4:fny1tE5KIK7tE5KIKv

Malware Config

Signatures

  • Renames multiple (2893) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3931ab173fd83144e591fe8767baa710N.exe
    "C:\Users\Admin\AppData\Local\Temp\3931ab173fd83144e591fe8767baa710N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    89KB

    MD5

    e5651ed6906e8fffad0d53ea338c4838

    SHA1

    698bb7405bea158af17b14616707b261711a8eed

    SHA256

    b59c38f482e8808ffd41921b98a79447fd60fc0e80baea9e358c8187ca88884e

    SHA512

    db35127be216f0d7db5bc200a0780e0f29b1d5c47a6abb1286a67cf3a4933c280cab03c99e8c88ac16fc28733f38524e8ef9cbfe620a22e85ee8815524ac743e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    98KB

    MD5

    84ec7383c6f0121d1707aec305029f77

    SHA1

    7f82fb34ffe9811136235b22c2105c29fcbecacc

    SHA256

    d3360da7151bba0b23d9cc0d4392a46444267124eb2ac3035efb981eb2ea2085

    SHA512

    7e492d3a87ebd0f50da7691c3d30075f9ec4470cd4ffee405cbe92ea78b6ecb028bf2567052643d2d4276de370a7c71f2adce7db0b396e3f9e42e1464ee42c2a

  • memory/2404-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2404-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB