Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 10:25

General

  • Target

    dee110e57390b33981e1c1befb3501c0N.exe

  • Size

    30KB

  • MD5

    dee110e57390b33981e1c1befb3501c0

  • SHA1

    9f334a242a9c5fb82ca10f352daba7d0ea0baa93

  • SHA256

    43ef0fa3dd101cadf7ff73e043837dc6d658a82b40f65fced311795a8c9b347d

  • SHA512

    b57c14a7b453294f400693edeba748f3a9218d640cf85eff2642891ff00041560718e78d1824837b651022e64a4b265dbbdf159c8f55ddb366a1ec401d6fb799

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9nxOP+UDpOP+UDJ:CTW7JJ7TrOP+UDpOP+UDJ

Malware Config

Signatures

  • Renames multiple (3217) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dee110e57390b33981e1c1befb3501c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\dee110e57390b33981e1c1befb3501c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    30KB

    MD5

    b838d4a0a71d69e1a26ac8683c6dbd47

    SHA1

    19d7af50dffcf448616f8b71e37e4211b33fa767

    SHA256

    7614b5b78787f9c6a7d14d9c848759b8ceaedba6f5b4c053fa6e56683b996186

    SHA512

    e40c48d9eb5044013a2b22217660692e8e2d8755441a3361f23c19358955db0d52b2f3cad26adc6005b38fb1c9a329405abcd259940b0131d93445be056499e8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    39KB

    MD5

    10ba1973e72cffe397f2b72b22601f42

    SHA1

    3bdacde26a6b3dcf0b315f4c05b8b93feb50a47c

    SHA256

    4444bc933ac07e6ac76d59ce6e708ee13afccb6399ee7e16fd5425c32f56df88

    SHA512

    5d77a907e88632f7c308cc438ec0dea4beaf510340716d51b062320dcfa9e1dc1775a64df6a28e7215625894325cf54fd29354f2acb02ea3c4eeceac46f98e18

  • memory/2644-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2644-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB