Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 00:11

General

  • Target

    e9815b847f020ffcf834735044739160N.exe

  • Size

    68KB

  • MD5

    e9815b847f020ffcf834735044739160

  • SHA1

    85d1d02b4c705c31c59745fb7d49becb1dc0536c

  • SHA256

    7b9051dfa2206e1d22fc7d83d185a1d1a3f797bf3a3d8d10b2de5bd52d97db29

  • SHA512

    d4aca705a30d626f9814d5c9ce00643e0d9ca53b102f100879671babdf49863a56e350f2bd0cdc4f276d11f743baf4fbc040584343f098201d70923ca11065f9

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzm:CTWn1++PJHJXA/OsIZfzc3/Q8zxSLL

Malware Config

Signatures

  • Renames multiple (3159) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9815b847f020ffcf834735044739160N.exe
    "C:\Users\Admin\AppData\Local\Temp\e9815b847f020ffcf834735044739160N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    68KB

    MD5

    092a58bd4e55e28e14a48359fcfea3f4

    SHA1

    e0dcdcc951da7480a8195a404132029e622c8e08

    SHA256

    eb9254972b6cb5b8f3dda1ab7398724709ecc0e067dcdef9c6a74ec305214fd4

    SHA512

    cf4621b90b35bd1557ffb236b886351fc45bfa9e70cdad75039ea5ca73bb01d6cb3a0c3bb2fa9b10b55c12f54c86b70fb65ff0bfc273c656d8f38f532060178d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    77KB

    MD5

    6c87b746ab20407096390f2ebd07c549

    SHA1

    9a38a7d1b53255793545cd4d86c1dc6fe12a70f8

    SHA256

    4e7eb1c2ad9fa22ff145676fcba19d05b7dc957d3efce0b120fca08f0aea95a3

    SHA512

    56d2717eb8f10d3381afc3f62bcba96cfb05d7cc7a7fa5ad51dfb7e8183cd084ed6c06ba42f09523a2f55440f5e12c9dd877e59135488257ab6190bfd80e25ca

  • memory/1740-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1740-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB