Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 04:07

General

  • Target

    c3c0c60febb94acb94c8315d27f60c50N.exe

  • Size

    34KB

  • MD5

    c3c0c60febb94acb94c8315d27f60c50

  • SHA1

    60e3a49cabf4f53b8c181189e3ad6d567d791009

  • SHA256

    55b4b82d0551294860d15d9d5d0e15d39a68e55d99ea5af5f0ec78aface3b8f0

  • SHA512

    9ee27bb9948b794f23b9a5b79946905b5f4fe53a6f06346e17899c134e4233cb435035b5baa84f3a0bb4cc022ef1312c4b714aaff077d7c4abed0fffd7ec11fc

  • SSDEEP

    768:kBT37CPKKdJJBZBZaOAOIB3jM2jMO/7OS1So:CTW7JJB7LD2I2IbS1So

Malware Config

Signatures

  • Renames multiple (3461) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3c0c60febb94acb94c8315d27f60c50N.exe
    "C:\Users\Admin\AppData\Local\Temp\c3c0c60febb94acb94c8315d27f60c50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    34KB

    MD5

    e58e8cdc54c890d222fbef39a11a00a9

    SHA1

    a4463c37363194b7a9406bf635d0cc765b34c18b

    SHA256

    b707218abf327117ecb401c5287b1a04df44205d1b38aa33ff7818805a753079

    SHA512

    7367cd671a440c68545adeba7a7deae9f028f2be611508153ab72dabb3901ceb0f7b666243d3552d244ea538826b26798e4a4f8e4d5f48b3561553861530e61c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    43KB

    MD5

    5e2f903b8fe30e00394a018cf2c22c1b

    SHA1

    12ad1779280613a4afb9a44abf803612a336bab6

    SHA256

    5089e015230fefabab1cd7702b4052cd0a04421a74c60943ba81a3c910033078

    SHA512

    57b096566ec98c6831961ca381a2ff9f8c59de42f65fbc2b1a38cee630beab84855a2cd3422cff7a06b4e4835a8ae7095dd8fd7196f75096545c757c4d8bd1b7

  • memory/2188-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2188-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB