Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 21:30

General

  • Target

    4f139aa4b841700c2066896226e1560a49cc3325dc33fed2d255cc276a9b3d92.exe

  • Size

    99KB

  • MD5

    20c3d053ee50b6208c910ffda68c65f4

  • SHA1

    6edfffac1e360f14433f008c1117dfbc4df91d4c

  • SHA256

    4f139aa4b841700c2066896226e1560a49cc3325dc33fed2d255cc276a9b3d92

  • SHA512

    2641ab80670dc80999b19cce8080e48da70bc5370ed6e37f8001bfbbb9171ad000d3da41444cf72ad09b438e31da25e94104d011183691bdb8b71e6aa7b03a8e

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsJOLKc/xJtLJtTGH1:fnyiQSohsUsUK/1

Malware Config

Signatures

  • Renames multiple (4862) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f139aa4b841700c2066896226e1560a49cc3325dc33fed2d255cc276a9b3d92.exe
    "C:\Users\Admin\AppData\Local\Temp\4f139aa4b841700c2066896226e1560a49cc3325dc33fed2d255cc276a9b3d92.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4120
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4160,i,10369132178352108590,11047993562598554317,262144 --variations-seed-version --mojo-platform-channel-handle=4188 /prefetch:8
    1⤵
      PID:544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      99KB

      MD5

      323a1af8ebb32b118c56f8b3e9035ee8

      SHA1

      2610ba5d031bd04bd3aae9aa28e4c743db50f19e

      SHA256

      e91d88d370f6a1717346d64f3a92cc93090477747239d5cc14b7a9d631cdd8cc

      SHA512

      a3bb12baef7485d625d3aa4208138ed332740433e2315c9eccf7398a834e16d19b83f90370f74a41c3103171bb2c9271d4d4b7a9795be3b1bbeb118910d11670

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      211KB

      MD5

      28ab55c0a256c339d06fde5b0ffa83c8

      SHA1

      f5023ad4ea62d321e47ca7a8583054695be72545

      SHA256

      009f127f20af00183a40ddd829234bd3df9dc3fcd2c7788e685c4577182e987c

      SHA512

      2e016de26e085e782a086f6569df9e8db28cf55ae41acf9d87e844be6a37285713ddb1911034b0ae77bf08de549e4b5da800bffce79b511f2178c4f1fae9722e

    • memory/4120-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4120-810-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB