Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 20:31

General

  • Target

    39e7b8f21ee869fa5ab7099710e674ca0a60e79020578fa67365921ec8af130b.exe

  • Size

    85KB

  • MD5

    63c7ae32c9c8eab29dac2dfe8dca40a8

  • SHA1

    18cd9fbbbe3d04b72289ab5ebecb56c54b8d6d65

  • SHA256

    39e7b8f21ee869fa5ab7099710e674ca0a60e79020578fa67365921ec8af130b

  • SHA512

    e76b4d01d462ba94ac2ba5c90684b17fc2a4fa266654be7b4f9ea7263e59ca005db19b98628ae8ae12156727a52decd93a8b735399d7bdf147b9a8c3719ee613

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7T2StuSt8TW7JJ7T2StuSt1:fny1a+u+Da+u+1

Malware Config

Signatures

  • Renames multiple (3432) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\39e7b8f21ee869fa5ab7099710e674ca0a60e79020578fa67365921ec8af130b.exe
    "C:\Users\Admin\AppData\Local\Temp\39e7b8f21ee869fa5ab7099710e674ca0a60e79020578fa67365921ec8af130b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    86KB

    MD5

    7ece63cd6fc80c1687a832970d77b739

    SHA1

    dbd77548f94ab61ad520bb1c70902e91205da5f5

    SHA256

    3461c6dab7570aeceea66cbbf9722ff9f09da07e703f5786d78755e70aa29047

    SHA512

    98276637287e5f02e2398b083925aa01755bc248625a6fb092a7545f384a9ef5dd77adf7c05851a0aca5af625502894f710e0fe2fe54534a4c65a66d6d4ef829

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    95KB

    MD5

    b820e268ef1ed0b7b8c43c43a487d3b4

    SHA1

    530c8ecfb24eccb6750b51e532ee40c302e3bd68

    SHA256

    20ce4a8d5454ac8cf1e28303027c876bae4e7920222f12fbcd81b16dfc509609

    SHA512

    324b0788b3d1a0c0a09efb8b6475a363337d34eee6b551ea4b06156290ec8c94385450094a1db49994d265c5decc783c7cf5bed87c3dc719706721ea6d4091b8

  • memory/2792-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2792-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB