Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 07:37

General

  • Target

    7aa4463a321cde7dea17f9efdf9dad50N.exe

  • Size

    77KB

  • MD5

    7aa4463a321cde7dea17f9efdf9dad50

  • SHA1

    e035ee707c4b6dff6b90ffe890a3979c3ee72c6d

  • SHA256

    82ea3f69ef8df4bba45a9f7264dee6d651e1432547c246c22dd9dcd487c51bf1

  • SHA512

    53fc265fff7397f31ee4ec4ebd3c544e3d413e0620ed1ffe15881c3d91a2c114ed746a3d49cba05d01d92da1b3206f478c32a01252198c1a422be9663950a4f8

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNy2/mepYXwILQW:V7Zf/FAxTWoJJZENTNyavf73tQqKBBBF

Malware Config

Signatures

  • Renames multiple (3207) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7aa4463a321cde7dea17f9efdf9dad50N.exe
    "C:\Users\Admin\AppData\Local\Temp\7aa4463a321cde7dea17f9efdf9dad50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    77KB

    MD5

    1c0a7892a02f05d37c0b04839db764b0

    SHA1

    445133e6212422603fdb2058c837c00de2fcb051

    SHA256

    0c2b682f44a753f94b736680e012de78a6cc913e236243f93052973afcb934c3

    SHA512

    521483bc36249fee2733d37e012b3f55bce6f1d7564497823c55981e4da5344f69352e6cfa94e3ccd31decab40748ea9ff161f2ad62119b1a7d90937ccac5643

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    86KB

    MD5

    233870339aeca90d64b053390e245771

    SHA1

    bf2f93e436163710499613f0da9c27ba6eb59478

    SHA256

    854686e641e83520f0d206b65a3c54f380e7eba94fce07adbb5ac30ab13bab03

    SHA512

    ec11e1b76de34c1ddd8b7e6f9b0c837366b9e7c199a3bdf87dead50af1f674597a55aec20fbb961782ab5f73611011a546c876423280a472ef81c38fab8b7ed0

  • memory/1924-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1924-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB