Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 23:51

General

  • Target

    8f1ba8b0d63202064a7a0290e5e4fcfca9f95f063d31b026cdc616929aa0c47a.exe

  • Size

    29KB

  • MD5

    165f5d01d3edf71ad23c073fc795f58d

  • SHA1

    528b3aee9288f5022c886c9184cdd514fc428cf4

  • SHA256

    8f1ba8b0d63202064a7a0290e5e4fcfca9f95f063d31b026cdc616929aa0c47a

  • SHA512

    98eb0e6ac9ebd45118f2789e3b14d8dbe4ab9f8d9d2777c0c3346715c51f4b9a389d793064a6cad01b29203cafada94260e7f8509d9c1ce68567b0e668be7985

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNyQYJEaEEI:CTW7JJZENTNyQYJEaEEI

Malware Config

Signatures

  • Renames multiple (3468) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f1ba8b0d63202064a7a0290e5e4fcfca9f95f063d31b026cdc616929aa0c47a.exe
    "C:\Users\Admin\AppData\Local\Temp\8f1ba8b0d63202064a7a0290e5e4fcfca9f95f063d31b026cdc616929aa0c47a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    29KB

    MD5

    a1a3e0a6b34658671e4d6de12904fc04

    SHA1

    aab36a95f950f04fcb38b1c8684e67e3dfe8f291

    SHA256

    4b351ac13b87b2070b62e661ea8b3b617d98889bc93d4ffb36bddd865a6d3f14

    SHA512

    9f8f5facd652dfc76304cc6aeb1505b72914bd9160747b37c449595b197e713ab4fbe8f694374a2297e8486a17667d40d1b462c1ff21a24af6b644ddf26fe3b4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    38KB

    MD5

    736fda27d2e37a57865d8b8866dbc067

    SHA1

    ba708488d3cc58f87847ab63139fa98be7d31a2b

    SHA256

    d0d4500df767fca8c2e02bbf440e01acd3c13ffd0d21c618d7df454b5167cfa0

    SHA512

    b6340101d893e12012dcefd75e32663778b29c7ef7e0b3548edde16d4e8d19f273698e9ae21c01803a79a49e9ce1d76582db3c41e318e40e5db4014a8388996b

  • memory/2856-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2856-69-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB