Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 18:48

General

  • Target

    b3ebdf27d80a99ea8988060c4c35a4e0N.exe

  • Size

    38KB

  • MD5

    b3ebdf27d80a99ea8988060c4c35a4e0

  • SHA1

    4f2953a7b03d994b0c153687ea4f956f5f124254

  • SHA256

    9d9baef530027e2be7b80279d8d95393a1c45b47849e851c759610e85627c81a

  • SHA512

    077a30209b9165a9108ad181176ba66a558378bdc1e2a5bb48698f3aab75e148aaffea2f0ad1b3c72237e71f65b646740f0a3984762d7e0e0b6b7f17a8edefd0

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJ59ADJsd4C:CTW7JJZENTNyoKIKMd

Malware Config

Signatures

  • Renames multiple (3439) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3ebdf27d80a99ea8988060c4c35a4e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\b3ebdf27d80a99ea8988060c4c35a4e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    78744aa5960f139339d6ece8b7c66ee8

    SHA1

    37b8c2ab2e76ea8c0f47b8f484d4634e871e17c5

    SHA256

    9e8ea7382f63580b63b34dae8d48b64fe23790355e1e4ef78956da4a70e08a29

    SHA512

    e381e702f285af7770ad74eca64029f623f0b7e1ea4e74c0d6df5257b018e17eba56472a3c2e5ed1d31bedfd933f00fcfe5d5bb786353d8e395b782a3a5e8c67

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    ab5212339d666e9b1c322aae1720dbe1

    SHA1

    8297d059c0b05bd0cedf314553e1f2ee0f527a14

    SHA256

    20a2b8690c04a29c621f87882a45437e2a000b5fb7c77a604d875e17a1d1919a

    SHA512

    12677fac8cc26cb94570d520bc24308e971160a643f63f40d426f7da2c1da8dffd05a1b522eaa634c6c5fb15ac8ec3eebe9eda93f343771c29b0fffe48201d01

  • memory/2780-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2780-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB