Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/09/2024, 00:19

General

  • Target

    0a03afd8af013cb153a26d50dd927f50N.exe

  • Size

    56KB

  • MD5

    0a03afd8af013cb153a26d50dd927f50

  • SHA1

    c4b47102d2911aafe69da6e58e8d1734c8d064d5

  • SHA256

    a7fe8732b21e18d0d765e045ed6355d4e289c5989ec84450d0b4b714fb06e2cc

  • SHA512

    ab532400e5f6fb018c91f76d35e2f7b3a5b458f30308ffab5438e0eb90cbc694950cb56034909920f058d5e32612e91b32cf6f3f50d91154f869a11ef7541bd6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBApwp133EskmKV:V7Zf/FAxTWoJJZENTBAOIfmKJfmKQG

Malware Config

Signatures

  • Renames multiple (408) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a03afd8af013cb153a26d50dd927f50N.exe
    "C:\Users\Admin\AppData\Local\Temp\0a03afd8af013cb153a26d50dd927f50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    57934b502cbdcd73df24077f41636bf5

    SHA1

    08ae955c99c0b1a84f501dc7e64209307fb1cd40

    SHA256

    b609cd31f5eb06c8102624752bf61e87be6af8cd4dea9978086ffbc2681773bb

    SHA512

    ec3bdc4dde1fd745e70bc2d6c045f78c31502090b1e05ee3f579d5c87a0121cfe0c143956ebe9218e1f2b92f40b68556aa50f93a711804cc492d7423a1e16218

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    b264801913933cf7f40499ae4d64ff37

    SHA1

    405e98c07eae4d581f60ffbf4800cbd0c5bc7667

    SHA256

    369ed09d329bc962577c22bc40494498d6f3a869da74686ba01da2d9ecb06adf

    SHA512

    6f0745470e391ed77190b0da831b2848e7bd01730dd142abeb5b2d1e909f1512916bba1d93e33b0ea71ee4e4304d404d9ef66061ae8727df33c027f67bceb4c1

  • memory/584-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/584-22-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB