Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 03:16

General

  • Target

    ea6ef28b5078a6232208a640c37f663904c1888f606a4713df6625d5aeaf8414.exe

  • Size

    48KB

  • MD5

    9fbd497d87e23606e5c71589a4279469

  • SHA1

    4ca0e697fa2497ee2fc4da005f42b8bfc519ecaa

  • SHA256

    ea6ef28b5078a6232208a640c37f663904c1888f606a4713df6625d5aeaf8414

  • SHA512

    d3995bf0be630d37b41425e32498a39a7a02fd285b2df31e15d8abb2a4a9da8dd7f75cde550d8d047b3e5c9f67122f42d1fa169e48f82852a27f222b9ae5208a

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9U7:V7Zf/FAxTWoJJ7Tw

Malware Config

Signatures

  • Renames multiple (3781) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea6ef28b5078a6232208a640c37f663904c1888f606a4713df6625d5aeaf8414.exe
    "C:\Users\Admin\AppData\Local\Temp\ea6ef28b5078a6232208a640c37f663904c1888f606a4713df6625d5aeaf8414.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    c9b6a56f8eee9ee50bfa983fdf87e84f

    SHA1

    a1a3db458a1e4343709dcdcfb328712c712cdeaa

    SHA256

    e61a47128e9ad86e09856f950aa7c06f8fdc68f53acee4fb4eb6f869d058d772

    SHA512

    5677e62f308f5020a3c1226f50862115fe9a70da80a2e64849bd2063e4fc197df6846d75c7c654ea494f1f505e9ea8e70441dba7eca4eaf6f3c233e845752686

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    37616c1d9c7dab8356238d2e20f18895

    SHA1

    182e5ef745a7e1fac6a2e66aaa39e933a552f73b

    SHA256

    fe27c91f40f232a82234bce75fc7c41d8aa0ec2b7e4df230e6c8a9b668ebd441

    SHA512

    9343f0128a4e49f9f0aabe0faf4d4c69d92be054eac1e66aa660dd0085b4e1eb135c1cb65a80ef0daaea9d87ccd376f202315856955184806d255d8f9aa8849a

  • memory/2316-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2316-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB