Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 20:24

General

  • Target

    bcb55644dc393afc3be3206b0e244e30N.exe

  • Size

    644KB

  • MD5

    bcb55644dc393afc3be3206b0e244e30

  • SHA1

    c91d20285b3a789bb1b19d7e6a114e83bf41ec1b

  • SHA256

    87e3f987a0bc66a440deea75c9f524ea9e73057d3e4deb5a02da18f5585114e6

  • SHA512

    99fbc268354cee4bc4fe11c7ce258a37b2b0586471c8217154f670d9ea64967c78021a928c34a7225735ca3b8d8bf4983e8e49e88ea4173bfe57426f757430dc

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBApwp133EskmKK:V7Zf/FAxTWoJJZENTBAOIfmKJfmKk

Malware Config

Signatures

  • Renames multiple (227) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcb55644dc393afc3be3206b0e244e30N.exe
    "C:\Users\Admin\AppData\Local\Temp\bcb55644dc393afc3be3206b0e244e30N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    644KB

    MD5

    9212af4b065868f43c7ba3778ddb8aa4

    SHA1

    6a2265485ce861d005c4f8c02f7f8a0fd8561482

    SHA256

    f3057e27045aa48531247dc6276b0a98fc15880944053b70b5265852985a4936

    SHA512

    4c5a2deea8d8ad960dc8fb8c187798e8e1ada39a75878f3134079531631f1e75f4e2e717c0dee5b122c826c40d730510705cea986bea7accac182d9cd60b04a8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    653KB

    MD5

    74050954416aad011bf34fc0b0688987

    SHA1

    d172695a6696c844d8cfccfa69f9a59fb1f44d07

    SHA256

    261256ef18a75b5c50a9cedd5e49fbf05a476389d351bcccd5804d3935edd7bc

    SHA512

    bffd0c66e1f83bfe24cc1858c5262f845b61ffd698bd1e55e4302cbc0eb0bd9bf6c9d58f312f6c1c000c989f870554cee452f3b82fb30cd526965a9b3c7da037

  • memory/2716-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2716-20-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB