Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 18:37

General

  • Target

    9029eacdbe7f00f198ea5845996913a0N.exe

  • Size

    105KB

  • MD5

    9029eacdbe7f00f198ea5845996913a0

  • SHA1

    4f0c57231c7870b24a00c82fc6b1c92dcf0b67e7

  • SHA256

    b94e446b5b4ccd2e2696e8b5534e3a0cf13461ec67390ea5bb41343a9c7cc1e7

  • SHA512

    1f6202a71a7454f030b85570b57b9777ce19cbcf90c31e1f26df7dc9872914270d25180c5443fd1324673a0fb2e55dfbe70509e5dafdbeef2e42f3f3d4d16699

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBWv36pTW7JJZENTBWv36H6:fny1tEevPtEev86

Malware Config

Signatures

  • Renames multiple (2922) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9029eacdbe7f00f198ea5845996913a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\9029eacdbe7f00f198ea5845996913a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    105KB

    MD5

    ad3b5e5dded6e9e693a4bd67ad3d3a56

    SHA1

    75b8ee8f187c8df3806baf1427fd4619eea11858

    SHA256

    ff43d33cf611f3fb73ba59c6ba921263a2eadfcb33a17b6b9d00c95597fb589d

    SHA512

    e5214d04030313b2a0d789caaf426db98ca53ce45273250ccd696d5caa6606c771dbf43ae764481664e8ab4e123624a4833ec41e05a86ac527fc06d6919f280c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    114KB

    MD5

    8dbf31b91c3d1250818cb7e066aa3142

    SHA1

    ecf39e06efc6d8c34d1ef3e63cfc8f97bd89d287

    SHA256

    6aa088a5094ea81a5904b91763723610fb1de9dd6988c102337cbbce06bd0fc3

    SHA512

    b1ac730c9a02d90659a461a59bd007ac2821a44c109b867d1522a2d9b33bf9086847849dc1a4c5d7778176b3785107fac905f24762498641eeb474969e040305

  • memory/2560-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2560-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB