Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 21:47

General

  • Target

    5a5a013a7e5f309bbab867d4e606f1d22d948953cdeab8f708fc7ddba105e89a.exe

  • Size

    82KB

  • MD5

    6f411750a55df816803f40cb07aa7076

  • SHA1

    783f4ec89cc9fe60830aef2a9c343509fe4c0ad4

  • SHA256

    5a5a013a7e5f309bbab867d4e606f1d22d948953cdeab8f708fc7ddba105e89a

  • SHA512

    239790e38da26a96e8ee6f19618314e19186289735030b322c38463048826bc117527de3045946ae73f77024347b5ef0a3af97af88404ec46ce53a5f08c169db

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8IZum0mHXxXgOT2IOT2Lpp:enaypQSo7ZBXxXgOT2IOT2r

Malware Config

Signatures

  • Renames multiple (3551) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a5a013a7e5f309bbab867d4e606f1d22d948953cdeab8f708fc7ddba105e89a.exe
    "C:\Users\Admin\AppData\Local\Temp\5a5a013a7e5f309bbab867d4e606f1d22d948953cdeab8f708fc7ddba105e89a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    82KB

    MD5

    7b1b1af2af1b7b7c1875c09d380afccc

    SHA1

    866dbceffcf8316b1408a999509527b48c916e5f

    SHA256

    3240d1fc05a17aed0c1cccf4eee3bc75fa2dbb54f885b19f2a1c0c4c6ee502cc

    SHA512

    3db341456bac3dff82f06a6c3e40cd38e87b01ad5d74f87083f0ab9bcf33e60193bd175eadcabeb777850682fd50e48cf0076148a69f9c331181a1b91965c1af

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    91KB

    MD5

    03e2c5fd544b26c7feeb6079da1ad9ba

    SHA1

    b19ebc71442b78819e32697b0caa30268b0d5fda

    SHA256

    8f50c92d60ac69df6a08f9eaa080bd3a6713f7e830abef70fda6d6d088470bbe

    SHA512

    e1dc756ebe8f10701ce50eb581d8f6f423101b5d90a48e0291028d33e55363215253d6a53d1080cb7e7721f8518dc1c68d7b3c6e86c4c5a9e08b0577f534e961

  • memory/1676-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1676-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB