Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 02:48

General

  • Target

    e1e5b9498ccd970d7350bf2a19050600N.exe

  • Size

    29KB

  • MD5

    e1e5b9498ccd970d7350bf2a19050600

  • SHA1

    b277b801f86c21942acecc8b02f640e6ee9d2af8

  • SHA256

    5ee6d2f285765f8c82c3312129f0840cc8d8d9ba9fdddab4361d23ee69f82329

  • SHA512

    b6d19bf6d2e3d694922381c5122c97003eee584f7c300be461e0d3023a02c165329a31a0c6679db735a02512a69b6d91f69a05c011095db3a5d6ccb36ef00e6b

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9ZJVuE:kBT37CPKKdJJ1EXBwzEXBwdcMcI9ZJR

Malware Config

Signatures

  • Renames multiple (468) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1e5b9498ccd970d7350bf2a19050600N.exe
    "C:\Users\Admin\AppData\Local\Temp\e1e5b9498ccd970d7350bf2a19050600N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    29KB

    MD5

    0acf29d37521efd923b1b9730a08c3d9

    SHA1

    6302752013ca3e47e68208769accf7a8123a9290

    SHA256

    24a1bf16072ed98b24815276c20e07e0d991ea4021f01da90461bac04af2a9d6

    SHA512

    7543d585e8c2a19f35c7552d88ca5e2568e43e6724c627e49b79d8577f4c0a04537eaed14a5d006d964e55ce519055a5f36e7dc92954e7939ab3319a0007b7c1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    38KB

    MD5

    39e9081d5d199ff42224ad6b381eda1a

    SHA1

    987db94f7d088bdc68a04fc9b19cfcc2e71b303a

    SHA256

    b127c1a9b4820178cc98e7940d17fafd8f8ef40cc3a49832f6f752b0551e442f

    SHA512

    eb452a61b7841d2054afd3f56499bf899ae8efafdf01386b706d0c7ed95c9f6ca06ab6be52c3d97a9a9043826feedc1d38ecc7907af67e3fceb0ef1cbbe6c326

  • memory/2532-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2532-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB