Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 17:46

General

  • Target

    b9c4546cd6b414187d8fd9c1f1805620N.exe

  • Size

    55KB

  • MD5

    b9c4546cd6b414187d8fd9c1f1805620

  • SHA1

    baa0808bbb463cfc0cf224409e37103fe237599d

  • SHA256

    23642750bb00b8c8f779bfe4e8ab9eb614687329df732c821d7d4503bdbc8913

  • SHA512

    6f456e6a6c2a50beba456d8c50e9fbba327af15e23001473656020d8edb0769d2ac2656b0d22ac8361cf40490b6c40700a9a1cfc354abc157eca64af7b32b4a5

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdb:CTWUnMdyGdy4AnAP4Yrjwkh4wkhU

Malware Config

Signatures

  • Renames multiple (3106) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9c4546cd6b414187d8fd9c1f1805620N.exe
    "C:\Users\Admin\AppData\Local\Temp\b9c4546cd6b414187d8fd9c1f1805620N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    ad6783c9208fe8f864ae6bdad6d35c89

    SHA1

    6254ff75160e4355d7dfae429741d2060de6d0df

    SHA256

    639ae6978ab5efcb10125877bf5e8d75a3881ce18ceceeb12782ba6130810eff

    SHA512

    f091b278cd221ff51aec430fa0d1e74f877fa0834a28a3ea0455a6f2904627b7b5225a6758dc95ffb43b3808d07cd6599793fd8f3548cb75ce0c0879fdf3ce09

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    b66e21f292648519f40ad3478e70cac6

    SHA1

    a6679e04171ad9a68db2111bb26f36b0ece48273

    SHA256

    e72b5a8fdacd7836a6dd311fb249cc5e9f277f96e0369be95ba490ea54a134cc

    SHA512

    b6c1a2e19eba9a64ba9389b4f7562466b34272faaa29aebb4ededd899cefc8f3611a18af1fb9c80ec7cff95c12eb1ad0af1845485eff8b5479edca4e7f7b5fe8

  • memory/2908-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2908-69-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB