Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 10:56

General

  • Target

    9ea95262a77e9d8728942cb088970de0N.exe

  • Size

    137KB

  • MD5

    9ea95262a77e9d8728942cb088970de0

  • SHA1

    eef3e8eb3cfdaf01fa5e741e11f4aaf23b9d14a5

  • SHA256

    87b5231fe7f51da0d43f42ffd85f64176d582ca5b8ca41d1ad6ed92f88cf70f6

  • SHA512

    7266cf4ac2bff082f37c1b37542417108fa96d1beabbb5b52ab4fa020d60595eeee19e0e0981a74776c70faac9c91e8580320cae313a8baa80ca3b0656bf12ee

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZTETWn1++PJHJXA/OsIZfzc3/Q8IZTN:fnyiQSo7ZAQSo7ZheS

Malware Config

Signatures

  • Renames multiple (293) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ea95262a77e9d8728942cb088970de0N.exe
    "C:\Users\Admin\AppData\Local\Temp\9ea95262a77e9d8728942cb088970de0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    137KB

    MD5

    050750268672d4dc45452e9e9b0ae3aa

    SHA1

    895bd073e74d384b0efb61ff81c049f2078f80e9

    SHA256

    25d8ddeba3a72783eebee982bdf2ef641f78da1d902c45bc70df7dc8108728af

    SHA512

    c2052d194ad1f182297c87edb0073103dbfcd843d024ac295d5bc37d61842e2729d029d14a3d3b141dbeea82c9b2b54270a37cefc249473b53162dce85ceb564

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    146KB

    MD5

    1bd0bb47d9decb1d451b922f39bdc3b7

    SHA1

    767bc49c77f6cfcd432a04a43b8373dab7cdb09d

    SHA256

    fa886bf190f7bc42230d83c2871a606d9a9fea26b8a784256b196773693d98ad

    SHA512

    8b4f0be840f4b35b90ee5517f09abab6476d208e85647bf920bc248e3a77cb61bf36c73a27ece0eb88dc5777f5178885da3db8d6078d835fb463b4d21a781589

  • memory/2952-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2952-26-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB