Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 00:52

General

  • Target

    b22a5e99d7c86b96e49b65052e6b1717d18a436c52bd8cf232779fe50ed806b0.exe

  • Size

    64KB

  • MD5

    3f7d5945d56bc18006a0b70004b20211

  • SHA1

    05c53368538de7bb639909d039a4a3af291de469

  • SHA256

    b22a5e99d7c86b96e49b65052e6b1717d18a436c52bd8cf232779fe50ed806b0

  • SHA512

    d40af6ffedbebad8d800d2690da8cf7192604daeb45b4f32f7eee5f255f4e7c3c473336e50bdf1c4f8f523361d45e8b447afc00488d1595e3957c6b348c92803

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rU:V7Zf/FAxTW/ySSh9j+9jpGnb

Malware Config

Signatures

  • Renames multiple (3672) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b22a5e99d7c86b96e49b65052e6b1717d18a436c52bd8cf232779fe50ed806b0.exe
    "C:\Users\Admin\AppData\Local\Temp\b22a5e99d7c86b96e49b65052e6b1717d18a436c52bd8cf232779fe50ed806b0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    64KB

    MD5

    99ac962f263777c0d7a7a6f886de8bcb

    SHA1

    ceaadb6427f35303e1fd4996dc55cefb2c599963

    SHA256

    d628db580b253d171a9e8060afbdaf1b8d959e4013462f0b1f92843d18106e32

    SHA512

    ccdf1900d03502a9960e8b6233256bc916fd0062120e64c50896aec81d264522c6428938f8d5696a690fded0e01629ecfef7f627e7663c66cf41c2c1f8559750

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    73KB

    MD5

    f0a4b49edbbaeeeef0d6a495af1bc9db

    SHA1

    ba1526d65a5aa2f1f39b47d4bc2ef0cbe757e0bc

    SHA256

    e0b7efe7d4fb05323e4b977fb762ba3c68c1d3a1045300a64b85d15e25545470

    SHA512

    882b7ffddf5e743dbcc43f12cead05560de241ea4b62ea4871773ca5f56276ec3a39baa55e01b6d167627deb46f0faa532a5e699b2291f538a1416498508216d

  • memory/3064-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3064-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB