Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2024, 15:09

General

  • Target

    abf5ad635e9b800559b83b1934463cb0N.exe

  • Size

    59KB

  • MD5

    abf5ad635e9b800559b83b1934463cb0

  • SHA1

    060c110ce2754be6d4b38ba8d090f4ed8e3fb2c1

  • SHA256

    2a5ad83e7527a784f314f4f4a9f5667f5ef468d4a82a4e4a0f0b32147d10d6f9

  • SHA512

    f413935efdee5b6159f51aedcb0f8e286018e1f706d84ec4887618a1c5301cabfa0639374b40e2903b90ac0e2e77fc6aa4d8b263e8765eada518988b8a3648d6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJH:V7Zf/FAxTWoJJZENTNyoKIKMmrs

Malware Config

Signatures

  • Renames multiple (3275) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\abf5ad635e9b800559b83b1934463cb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\abf5ad635e9b800559b83b1934463cb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    84c8c712a67075b8140c2df378aea216

    SHA1

    1f20d183e247a35e27e6b82cce7cbefc85eaa763

    SHA256

    de6a8e40f1f29cc5c6375ac9d3e3d58bb2ed72c612be284847392df0ff6dcc8c

    SHA512

    97684a411e69a021df2f6c95a26ff38a06c139df4a120639f44e67c659db150a0fd69cb9fb5ed31342cbee80880c1b5fc048c46e3a274d1a432cd7abf23619be

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    68KB

    MD5

    00f44be0e0f392caf96e0b6695b93c9a

    SHA1

    0e16b585efcb7f23b6dc1260f97607e57d0e0b05

    SHA256

    e879552625b73285145fca42e0d66b263060361ed01f5b51a75a4f00cff4ad0a

    SHA512

    e3a29fa67566c2feb822ef997a4ceb113f22f4fad90fca894f61fd937848d8b4e879a7a08d435cdbfe794979a7ad89e2ee3e5529571f62c57deb3e79500b18e1

  • memory/2320-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2320-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB