Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 18:17

General

  • Target

    438789ffa009e632098f1affe8eccda0N.exe

  • Size

    42KB

  • MD5

    438789ffa009e632098f1affe8eccda0

  • SHA1

    ec57ba466d82ce4cc97ec2ba63b32f9483344d92

  • SHA256

    040d9d1b852babb989a666876605cbf8e56e3bade18fa1da874bb89548888d4c

  • SHA512

    4c1f9bcaf2d100461839ab6d2e78d1c2318227eb7aabcc93d94b4674f3d40a666c60a45ed55c6e5a8f6bd3c7652c7b637e58f451ec22d82b14ddfac26ed90083

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKvhWSwSKV0S:CTW7JJZENTNyoKIKMSwSKWS

Malware Config

Signatures

  • Renames multiple (3206) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\438789ffa009e632098f1affe8eccda0N.exe
    "C:\Users\Admin\AppData\Local\Temp\438789ffa009e632098f1affe8eccda0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    8cece9b713e5e3b6482457012ed4bdf6

    SHA1

    868ab91c60000357824b19cc08e1bc95ccbe2c41

    SHA256

    60b86cdd48f1b008e870345930c4f58fc7785554101ce3b70aec67c0c84bea3d

    SHA512

    1799cb098bb8fa815a49a6e97f824bb6a6924e299a3f91712e82c90823c6ce579a9af59ba3d32354de1b9f8aeffc333f33bbe5fe2e7902ad851ac6ae92bb8820

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    93a1d85b07d461240a1893c22f5ac5f7

    SHA1

    41d5fc1be2454d8d087d22febf34edc1035e9578

    SHA256

    2d71bf7e57b93605cee906110f0f70c8bf3fad17a73f0ba0ce3cc1d5969f00fc

    SHA512

    c1abef8e1781d830070026cdb759137929d5233350d8041e85c5093277f9c100a1f89aef3af9ca264f772b141b3189db23015b538b9386fdfd7ac246e32fa961

  • memory/2300-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2300-69-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB