Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 00:21

General

  • Target

    a127e2393cb90625072e100f034211ef4f316eb5824ae26bf1d556bbf67c7d69.exe

  • Size

    81KB

  • MD5

    161ab9efee5af14bf6f8e92467f46fa9

  • SHA1

    7c67f9228a5d65503a390de8161d0e10bb242e0f

  • SHA256

    a127e2393cb90625072e100f034211ef4f316eb5824ae26bf1d556bbf67c7d69

  • SHA512

    7ba9fdc461509b2791cf8f088379aa93247895f86244b05f4a05a762384bb789ceaa2a5e2c4b414f6a523f8df01935d58d7755fa564144e605cfb00458016eef

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY58fH:fnyiQSox58fH

Malware Config

Signatures

  • Renames multiple (3709) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a127e2393cb90625072e100f034211ef4f316eb5824ae26bf1d556bbf67c7d69.exe
    "C:\Users\Admin\AppData\Local\Temp\a127e2393cb90625072e100f034211ef4f316eb5824ae26bf1d556bbf67c7d69.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    5065d25529fa4294ce9fc93950be31a6

    SHA1

    18709e4b29cf48461abe08b66d6c25957f1c4f52

    SHA256

    cc5500e866859725d4cbc04357158f6eb5a96efde6c4b6b2928a5e98a2ee0983

    SHA512

    4ba74996de5c64545374a44046751977610ce1dc9488159d481a7c5467b0abbb54e109e80720ba90845d65829bda83d4dd82820cd4d48660964499a6d47a7df3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    90KB

    MD5

    e32246e5805b3a520ee051034348cc7f

    SHA1

    9fc331469a5e1f06f75011a1b173e263e7755b15

    SHA256

    5e6bd1a8524c9b173edc34affa47c86a83dc5689a5ae273f86cb93957180af69

    SHA512

    bbeb93f126b93b465dd849811fb7fc31df24d6c0ef50f8d39e1f1dd2dc8e6a6438715177101cdeaf34861f7a0e1d684da76347bc1d94b10eb0a85f8bf8a26275

  • memory/1288-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1288-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB