Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 03:54

General

  • Target

    ad12de278a0ec6253e387763e66caf464ad2bcd50e210bb17d5b37949b38f5b1.exe

  • Size

    31KB

  • MD5

    0a274f0e80259d52ce00b2f116fa9b81

  • SHA1

    c509a8906ba26e773a48884e4c4e00fb9d3c8308

  • SHA256

    ad12de278a0ec6253e387763e66caf464ad2bcd50e210bb17d5b37949b38f5b1

  • SHA512

    3fc97b9c4a801d657e9589c0575909b3afeff2502661d353e6b8fc5e987703c1750bef01e37745ee2e1223d273ec6977ae2eacefabbf64456fce900449484b3a

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9nj40g40T:CTW7JJ7TJLgLT

Malware Config

Signatures

  • Renames multiple (3685) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad12de278a0ec6253e387763e66caf464ad2bcd50e210bb17d5b37949b38f5b1.exe
    "C:\Users\Admin\AppData\Local\Temp\ad12de278a0ec6253e387763e66caf464ad2bcd50e210bb17d5b37949b38f5b1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    32KB

    MD5

    bba0d4336e5321aab52f3a7734da3a72

    SHA1

    fe3c66bc2e17312beb8004bd13e387235a79cff1

    SHA256

    9e901f89b48328f5436f70e07762d8e715a07ead6dabb2e902e87f69e1b50d8c

    SHA512

    3f7562e7fd43938f7845f433493272a020fd9a2da6dcb2558a628d5b6b2ff17b38df2995a5af4c551b3daa7c9ab251e7db4839cd4df9c2f6f9fd34380a503650

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    40KB

    MD5

    bbd0dc0136074b6224c5f14ad6b73766

    SHA1

    6706f4a9d3576e541060b64bc2eff4ef38c0295b

    SHA256

    50c204f7b6314c64da1dddad1d67a39199120b68574b4365a309503204e1eefd

    SHA512

    41c26898e8190aab874e23dfb62b49c53c6f512acc8c351515a40b903f46c95fda49f2a2ec884a1c4af6ec21382c39d0b37140369ae6c848f66724738b2b930d

  • memory/2708-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2708-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB