Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 10:08

General

  • Target

    3c06a5558d95f4a5ca91fd483320ef80N.exe

  • Size

    67KB

  • MD5

    3c06a5558d95f4a5ca91fd483320ef80

  • SHA1

    3538a296018ebcf558f2517b0b27baf9b327127f

  • SHA256

    2b339fd3cf5d82a6fed1a68aaaa8237a07e71288b6916abfd154bbf4bf725b4e

  • SHA512

    b64193e1730a52fa5b13a6e2df75c715bf352f26dfbdf41f466e40ac9dcf0839d58638955e2b7318041f006b99c744270fc264206f357fc1fc85c80d6ccb8db2

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiFDFCXXT:V7Zf/FAxTWoJJ7TTQoQFDFCXXT

Malware Config

Signatures

  • Renames multiple (3007) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c06a5558d95f4a5ca91fd483320ef80N.exe
    "C:\Users\Admin\AppData\Local\Temp\3c06a5558d95f4a5ca91fd483320ef80N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    68KB

    MD5

    319aa1cecc05753dd7983a5c5a415a82

    SHA1

    c0a4a2f2cd3156dfd3f4805e852f78c0a095f74f

    SHA256

    8f95d5fb71938868d07b8122f284a70baf452ba62d2e8f57121f863245541d81

    SHA512

    624cf7408f39353c82b1925f85e3bc378074469d511ccd9a9a4d341c4423e560edb76a6774f25326b3dedbfb44b63a41b1ee5f52606ad97950fccacb3a30a3e0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    76KB

    MD5

    7619c2cc142eea28ce41b0c4925e8121

    SHA1

    58f09f6a405f6710ed13ad22f7d5b274c74401dd

    SHA256

    98f2535fe1fb22e707237f4f1dc94abee8174244e8f61f320cdb165ac2e847f4

    SHA512

    07b1930242ed2f600b3a27e145595be6379b4704e316977586e49a42d0dbb2969ea70d0596490915b06ba208c6c42a2f7498f64b1c7cf4846025dc942b73ead7

  • memory/2336-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2336-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB