Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2024, 09:25

General

  • Target

    d70ccc6c8c0674f361999a46b3558c10e3b197deb5be749bb2040d62b43c344cN.exe

  • Size

    120KB

  • MD5

    7b640159e6249d4e1757f7bd8194eb80

  • SHA1

    fd395d3fa8c6625fd6804ff4155614040c1375a4

  • SHA256

    d70ccc6c8c0674f361999a46b3558c10e3b197deb5be749bb2040d62b43c344c

  • SHA512

    408d344f94616ed88e13199417bac462b0fa77137b2e5ca150ba3a314221b86e9ec7486238070e49646f0dfa5cf9dc4e7d036e4e15d3cbe5fa52d65d9e7c81c4

  • SSDEEP

    1536:V7Zf/FAxTWtnMdyGdy4AnAJYq8YqnTWUnMdyGdy4AnAJYq8YqugZ:fnyGnpAekgnpAekdgZ

Malware Config

Signatures

  • Renames multiple (2863) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d70ccc6c8c0674f361999a46b3558c10e3b197deb5be749bb2040d62b43c344cN.exe
    "C:\Users\Admin\AppData\Local\Temp\d70ccc6c8c0674f361999a46b3558c10e3b197deb5be749bb2040d62b43c344cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    120KB

    MD5

    34b12af2ec1442dbedfd6e5f5897456b

    SHA1

    b5cc4cc167aca2c8ae67e4211fed24538d5aed80

    SHA256

    1a55ac72938346154b244dc7cfb2592c385fed24202c3954e7f89040c96570f4

    SHA512

    7065049a2598a1dd706cfae9f2f7a6db26363257643c5d029fb8dbee131836c414de62fee12ff3472f168e71b6317c034356ff9a3867dd20dc49d9c521b831f3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    129KB

    MD5

    82f5d1cade2b231b9d85d204321c2091

    SHA1

    cf8429b5e5b7bcf9d71d0231f7de267959f1e07e

    SHA256

    d3d1521f7faee5a6659e836b57eb23ea73a02b954a0cd1d41c978d30a680c9c6

    SHA512

    190d7a6471f02655f6ae969351ae0f72288873f3f11ad72af0df08741988a2da3a1d18504dc12ac5551a043243a10a5c24cbc2ec55c0dea4032224544c13f862

  • memory/1628-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1628-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB