Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 01:38

General

  • Target

    81804d6ce551a73b38a5e844a8cb2290N.exe

  • Size

    50KB

  • MD5

    81804d6ce551a73b38a5e844a8cb2290

  • SHA1

    b821c18dfa78f50ea87f0ea4f73753a8f7a393c8

  • SHA256

    9ab62910818ea9dd7c54777e4af652521a40c5b996502db61f4f1f0ebc9fda8f

  • SHA512

    2d599404150db8928151b077a07c1a809a93456f43233bb5b5c19ba5579e83b0003c8d5d830fe28af8f4553a13c025fbf2a1fc9ec5cae6a30e40627fd6288525

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9nGcjkK2rvVk//Nyz/VCyz/Vh:CTW7JJ7T7jkKCVk//NypCyph

Malware Config

Signatures

  • Renames multiple (3328) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\81804d6ce551a73b38a5e844a8cb2290N.exe
    "C:\Users\Admin\AppData\Local\Temp\81804d6ce551a73b38a5e844a8cb2290N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    50518978efb270040903a48edb9c8f98

    SHA1

    e51514c1fb0463b7ad30843e12ba3b4136cccc87

    SHA256

    f178a621fccb4ff42e7586cf0e8ed52596d162596f8e35be5ef50ea5abe2b55b

    SHA512

    f34ae6b0038e8f29e616afdb973733ce8d7c67e354d1041f4b01fd42d8830d45af3540ee3ab3aa22ae0811cf2096afe82d52a8ed79e3aec987a20037a603732d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    f7c7c0e93ff3786a6914d33b2e069de1

    SHA1

    0402c00eee0951c5ffa49c0495bda7381122409e

    SHA256

    25f2b6caec5df77b25e1b5d5534428a84836a89f2f7633438f54bb358ae334ca

    SHA512

    30ff9cc6503930ebcd04690632da5769dcfb9897e6c24122d5e8d7a64fad31f3b53cef3365568e8729907b806a7524e2b78586a8df3f81c8c552ab139b1fa672

  • memory/2056-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2056-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB