Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/09/2024, 17:46

General

  • Target

    b9c4546cd6b414187d8fd9c1f1805620N.exe

  • Size

    55KB

  • MD5

    b9c4546cd6b414187d8fd9c1f1805620

  • SHA1

    baa0808bbb463cfc0cf224409e37103fe237599d

  • SHA256

    23642750bb00b8c8f779bfe4e8ab9eb614687329df732c821d7d4503bdbc8913

  • SHA512

    6f456e6a6c2a50beba456d8c50e9fbba327af15e23001473656020d8edb0769d2ac2656b0d22ac8361cf40490b6c40700a9a1cfc354abc157eca64af7b32b4a5

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdb:CTWUnMdyGdy4AnAP4Yrjwkh4wkhU

Malware Config

Signatures

  • Renames multiple (4373) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9c4546cd6b414187d8fd9c1f1805620N.exe
    "C:\Users\Admin\AppData\Local\Temp\b9c4546cd6b414187d8fd9c1f1805620N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3596
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4448,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4412 /prefetch:8
    1⤵
      PID:3972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      55KB

      MD5

      45fa15c18979fb1c062d5d85589a87d2

      SHA1

      8d6b8a1f8bc8973e5e2d318380d5f36511a64b39

      SHA256

      ff6c328139d49c40a405b6dea47b3bb045abf002f912e2514249778de6ab3eda

      SHA512

      c7b2d5fdecd567e1438f821b3c08d3ff17d424423c16e4a51362ed98b1d3a9065ca00cdf57019c958694215cb6558c0f24a77c1ad44146ad7cd1c32a68b20de2

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      168KB

      MD5

      4223bd4fff64d61d15deba463270f808

      SHA1

      cc55d74a71e80da377118e154cf74aded6b95977

      SHA256

      9d6a4f99cece980bf3df93e9f38a0dc0295adb300ca875981f77185004a7142d

      SHA512

      d0ad8bb751e82a0cc578cea478b4fb1e60586d693a51711f87d649489b945ff5ca364e5626bdf42f463a5d0e4c3b52166d5d97c216a8220bbf44c1f1a5ec2507

    • memory/3596-0-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/3596-833-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB