Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 00:52

General

  • Target

    b22a5e99d7c86b96e49b65052e6b1717d18a436c52bd8cf232779fe50ed806b0.exe

  • Size

    64KB

  • MD5

    3f7d5945d56bc18006a0b70004b20211

  • SHA1

    05c53368538de7bb639909d039a4a3af291de469

  • SHA256

    b22a5e99d7c86b96e49b65052e6b1717d18a436c52bd8cf232779fe50ed806b0

  • SHA512

    d40af6ffedbebad8d800d2690da8cf7192604daeb45b4f32f7eee5f255f4e7c3c473336e50bdf1c4f8f523361d45e8b447afc00488d1595e3957c6b348c92803

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rU:V7Zf/FAxTW/ySSh9j+9jpGnb

Malware Config

Signatures

  • Renames multiple (5038) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b22a5e99d7c86b96e49b65052e6b1717d18a436c52bd8cf232779fe50ed806b0.exe
    "C:\Users\Admin\AppData\Local\Temp\b22a5e99d7c86b96e49b65052e6b1717d18a436c52bd8cf232779fe50ed806b0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.tmp

    Filesize

    64KB

    MD5

    32b8261c4162bb6aec4b0fb8d7a562e8

    SHA1

    f2050f70647b12471f69d89209ad205838ed3989

    SHA256

    8a2816b1fbc9ebe2492fd67019704702602265aa91dc1a4411192bfded051b55

    SHA512

    2a3d1249d281179c3301a79f3b7f2bb77af3a1ab71504dca7aff57ea9271124e809c6844098e5d4f2fd3cd372fb8832255deb95fdeede8818f2f1a1249ab7609

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    163KB

    MD5

    bac28d6a205b987bd49876671b64da27

    SHA1

    c7cd87d149b787e3dd446fe4731552035f125d54

    SHA256

    eb5a0dd4c58f5a0affc8bdff0762c063bad699650e7c7a284e5a3a56848e1056

    SHA512

    3cf7ad9f78ba3a136cf11231d1d8b66ee6e791d01445222a01cafd34ff8fa74ad7c51422570de9a24b6ef37ef0293e9a7780e2f2171dc1632a6413316532b63b

  • memory/788-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/788-866-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB