Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2024, 06:45

General

  • Target

    c1c91dfef1dfb5509d605074408be530N.exe

  • Size

    63KB

  • MD5

    c1c91dfef1dfb5509d605074408be530

  • SHA1

    dcc383ee8375d74d9feada84c9d839adddd87564

  • SHA256

    6621db78a44de317ec13ec074032cc9b09081c2625604dffd049e339ac0ff67c

  • SHA512

    a3bad13076d6022253e613a04651b933f77d3ec06c2871fbad8800fc91bcc621ab92fb930552ab7edd68fa6dd2418f00d343bee91f4b95794b2e461d0cf2b3ee

  • SSDEEP

    1536:V7Zf/FAxTWoJJTU3UytJfOKI+h/YI+h/BMJevJea:fny1sI+h/YI+h/Bl

Malware Config

Signatures

  • Renames multiple (3189) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1c91dfef1dfb5509d605074408be530N.exe
    "C:\Users\Admin\AppData\Local\Temp\c1c91dfef1dfb5509d605074408be530N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    64KB

    MD5

    c7b510e59f74eb7dc34c5f0fedf76174

    SHA1

    025e2a13a084e1e2210f7f3861b7662410b154fa

    SHA256

    71132168cb6d838bff952a1893f6171e4f7c39b768bc324ba1bd40ffd7cd4265

    SHA512

    767347ef70042e2437e496b38e3addbe2c8fcb61d5d05c24daa3e665466eadb325409a7f5a0a8f331f72b0d0e5ccebf21d884f266cd6c7cd0c069973421870b7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    73KB

    MD5

    134b2a17f0a01057de50749494bd1e3a

    SHA1

    7f8ef99934d0306092e2e958f7128d971bf3dee1

    SHA256

    4f9aa5d70cd4fe4b76d367ad8c90633906235b6b8e6e0d15d2b3a7ea4562506f

    SHA512

    77d2f7ce2d6e6566771b30a6681b8de370da019de69c17809b31a827731d0ed411dfb430da485932119d99ccc70d267728a6611aefd7dd40859ebb5aa87e00bb

  • memory/2080-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2080-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB