Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 15:55

General

  • Target

    28e860f4ac9445aa9cdf1401c58d4420N.exe

  • Size

    84KB

  • MD5

    28e860f4ac9445aa9cdf1401c58d4420

  • SHA1

    838be61a0f34e1df475c2a10869a39dbaa5ff629

  • SHA256

    89115ec35d2bc6f0e02e2003f4fc9a58dc69a66f47da7432b4526f05993968c4

  • SHA512

    418615d4a424a9970c21828f709b225fd0584c2b046eda8cb939b87a85339fa0fd40bd17e831e8803f7449fe2eae4af2b5756f3e633bb7d1077d734c9e26d9b6

  • SSDEEP

    768:a7BlpyqaFAK65euBT37CPKKDm7EJJ1EXBwzEXBwdcMcI9SBo7BoABT37CPKKdJJJ:a7ZyqaFAxTWbJJ7TXTW7JJ7TaDvDO

Malware Config

Signatures

  • Renames multiple (3213) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\28e860f4ac9445aa9cdf1401c58d4420N.exe
    "C:\Users\Admin\AppData\Local\Temp\28e860f4ac9445aa9cdf1401c58d4420N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    84KB

    MD5

    5a2002f767782cb609d38a01ac6fc25a

    SHA1

    e01e616729994613a72b4946a406eb0b7da4f880

    SHA256

    d01e9f20700a1eeb64d74285aa9b3ce3f5a75693187377ccd728c233e874fd1c

    SHA512

    d326b29860c76d08abeb768ec5c796138ee5486f6fd99069262861e6fdc0b40f4c353dc2472f21f07b383ae4bba467d1909ddce05f043ba3b783646ffcd7e866

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    93KB

    MD5

    43e64997679d63f0d22f2505332196c6

    SHA1

    2bcf80ac18c98e9e6079fe0b9f9252f0aee471a7

    SHA256

    db5a6aa271b0674c8f241e7fbcc2f460ae583fc17db7f28dc13a9dcd56dce6fb

    SHA512

    2424523b76dc66b14e11155f308aafdec97bfaaf79f6ffe8c68a95c3459b6c164f5570afde990474ce4649dc789f2c71522fb60307c164681494f3ed06ebc7ff

  • memory/2196-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2196-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB