Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 12:45

General

  • Target

    Trojan.Danger.ATA_virussign.com_27c29fc73e8930b27cd405ce257222c0.exe

  • Size

    62KB

  • MD5

    27c29fc73e8930b27cd405ce257222c0

  • SHA1

    eeff1fc52df35f8efaaa672799e832b2b1a4c747

  • SHA256

    10a28da80db0af3e201bfb776a055848068180e2cbbf47934f9266c9bfda733e

  • SHA512

    4d2362e69b24c04adc8a1cba25cdd14adfff8b29fbb8e5f16c8be7b42699f38618476723daa2d7e3ddc1f80be0a241c3819fc4dfefc17a09be8cf65472372035

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9SBo7Bomu1J4x:V7Zf/FAxTWoJJ7TFuz4x

Malware Config

Signatures

  • Renames multiple (3442) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan.Danger.ATA_virussign.com_27c29fc73e8930b27cd405ce257222c0.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan.Danger.ATA_virussign.com_27c29fc73e8930b27cd405ce257222c0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    63KB

    MD5

    67079a8bf4d4f10202ef02aeac9e5fca

    SHA1

    14d14b6f734070a548f3361b2782199c5edbd2d1

    SHA256

    b40c7a457f7b892cdd94ef27385b4881836680ae28a509a210fbe29144dc2fb1

    SHA512

    e05d078f8c98af664d46807bddf354d22912b82291c7ccc0365579be778d362bde1af03c8b960c96b603ea2ca9eb9f6cca385dbabab4fabff579d53730f8d8c0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    72KB

    MD5

    508df9059878ec8a874421bdcdcec15b

    SHA1

    1ece27c693446f7ecb0df1bfd356a18f15e11d0b

    SHA256

    66f4d13217ff9b9f85915ca4938886aca78f1d1d7b9104cfcd528d5f11590d09

    SHA512

    ccf75104b28b13e80eba0322261573885ecd839a9f720d2fe037e31ef35c349cfb074ac00f9654befc889ffdc52430bd9a3f815736f3548e451e5fbf64904ae1

  • memory/2528-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2528-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB