Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 05:11

General

  • Target

    ff35885c21f2ffb613e45e28b34f6f4db77c9dc0100941b18883a685e01c86db.exe

  • Size

    57KB

  • MD5

    69de65780bf077c5ce7745d54ccc7b8d

  • SHA1

    448291d340ce77cea0d2b2a4355817acddf12f7d

  • SHA256

    ff35885c21f2ffb613e45e28b34f6f4db77c9dc0100941b18883a685e01c86db

  • SHA512

    efad72779d0fee69b47e6eddb97d4ea5f202fe9930754dcea7dd52468a26ffbab43782f7ef527c94768e083f2b08f470ee790142a72d576f55cf6055120e387a

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIp:CTWn1++PJHJXA/OsIZfzc3/Q8IZTRVP

Malware Config

Signatures

  • Renames multiple (827) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff35885c21f2ffb613e45e28b34f6f4db77c9dc0100941b18883a685e01c86db.exe
    "C:\Users\Admin\AppData\Local\Temp\ff35885c21f2ffb613e45e28b34f6f4db77c9dc0100941b18883a685e01c86db.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    fdec53ceb9ece5ba35ca8eeadafaf4ab

    SHA1

    4b289dbbe3b0076f052080562252970c08342501

    SHA256

    d13916847961dc4ddbcf7e1fe67ed3a4ff937e300c0385759fe194a1f656dcc6

    SHA512

    47fb0f2c70db72f9005ac27f8d2095ae3ec547afeee9cbb2f4825f746128ef103a134cab387b9b76e2bd8de22e0fbb42a3a95c396e13257bcfd7f64e8ea2066f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    2cf981f8db62225490f12ead589d25d2

    SHA1

    88315c50635def7c0b6c712c5600f4adc04c1f86

    SHA256

    da783247d2e416ab1ab7029be66d1fe590a2adedeb01556f49e93f01f61760f0

    SHA512

    65e0009d00c185150f7e2dbab704bf797e85451165e873732894e701216793642fed89a178f9465abb1aa7869cd8c559216a20978e362d15512c9f23eb7d8e44

  • memory/2112-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2112-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB