Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 12:47

General

  • Target

    Trojan.Danger.ATA_virussign.com_733ea1e269eb13eb4658ef932b353060.exe

  • Size

    79KB

  • MD5

    733ea1e269eb13eb4658ef932b353060

  • SHA1

    4c277b452536d3408849ce528d73ec87c7811aed

  • SHA256

    2376551137e2af800bfc2fd144ccfd481585d4b5321ac2df4246bab0994efce6

  • SHA512

    818041125c799c15a09bf0378d4a143951108e84252e4e429482f1c1d687881b217a41292bde4ac16c9bf3a1fe37481f488c985428c9d9b3831505a904bffa57

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8asUsJOLKc/xJtLJtTGl0Q:KQSohsUsUK90Q

Malware Config

Signatures

  • Renames multiple (232) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan.Danger.ATA_virussign.com_733ea1e269eb13eb4658ef932b353060.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan.Danger.ATA_virussign.com_733ea1e269eb13eb4658ef932b353060.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    79KB

    MD5

    ec6cc3f8225708d0e500f85a7172cc9e

    SHA1

    9692cdf57c3588d99b531c6abd89adc9699e8b79

    SHA256

    4bbdc5d17b840ecdc2056c0f4eda2dc20ee2ecca947f30fde79a6f7c4f4bcd6a

    SHA512

    61d36ba95e5d0f7d6f40f6959c654be43d14b05f701e6dbb41f1057dc4854406013c1bfe4caf4cdb47dffb6591361474be6ee408b873251cb74ff4d1e1fd6eca

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    88KB

    MD5

    9b4b51551f79301d0201985ae252aa1d

    SHA1

    95795aa35e62e4f48871f08b8ea0decd55bd9700

    SHA256

    f56bfb64d2d749d3fd7b885e124e081c51c04e946b1f4ad66d21525e7f8c7125

    SHA512

    7c80fefd88c1d4425d455299d5a5f11718dea37c7705cb2179f0d18ca8c4699b5df0ed831d7773d858e0d82bea651f78c9f41a98014fc7fa9d1544b61bef4450

  • memory/2084-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2084-13-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB