Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 09:25

General

  • Target

    d70ccc6c8c0674f361999a46b3558c10e3b197deb5be749bb2040d62b43c344cN.exe

  • Size

    120KB

  • MD5

    7b640159e6249d4e1757f7bd8194eb80

  • SHA1

    fd395d3fa8c6625fd6804ff4155614040c1375a4

  • SHA256

    d70ccc6c8c0674f361999a46b3558c10e3b197deb5be749bb2040d62b43c344c

  • SHA512

    408d344f94616ed88e13199417bac462b0fa77137b2e5ca150ba3a314221b86e9ec7486238070e49646f0dfa5cf9dc4e7d036e4e15d3cbe5fa52d65d9e7c81c4

  • SSDEEP

    1536:V7Zf/FAxTWtnMdyGdy4AnAJYq8YqnTWUnMdyGdy4AnAJYq8YqugZ:fnyGnpAekgnpAekdgZ

Malware Config

Signatures

  • Renames multiple (4369) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d70ccc6c8c0674f361999a46b3558c10e3b197deb5be749bb2040d62b43c344cN.exe
    "C:\Users\Admin\AppData\Local\Temp\d70ccc6c8c0674f361999a46b3558c10e3b197deb5be749bb2040d62b43c344cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.tmp

    Filesize

    120KB

    MD5

    a0236f1a83a224c5e2a2387064f538cf

    SHA1

    8bf8e05d48145977a3bc9a61f1e10caf2a471695

    SHA256

    b1005cc7f4cba4aaf781e5127a21db0a87229f775df18ea5bc694b2c6281c419

    SHA512

    79da9d761389a93b1aa91f18760a5e9843b673de250af9c693de06450a3e88daa0bff1779fde8ba86d76736c2c343283e2514e5e056205ed9483237bd98d2d6f

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    219KB

    MD5

    b227f91444f30e2f7a09a2476a99e398

    SHA1

    9e5e557ffbbc1c9ce8141a47b8bf989a12d94855

    SHA256

    b68cd882e009a6ea999d61246e200d714ce2f44b17c80bcf8c108dc2068eb8b7

    SHA512

    065554b2449317d0420ee6012f442a2492c1c55717913a02dd7cfe006cac04262744b4030e24b30d077f74ba68fb675718d221dddfc08bb3e317547b47bf8018

  • memory/3108-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3108-858-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB