Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:54

General

  • Target

    7e474bcaeb24584b51ae8c8cd5526bf11e84cf406598c4f2dafdb1aa705bcc07N.exe

  • Size

    49KB

  • MD5

    c43beed26a159e9830570c8efdc01be0

  • SHA1

    61697d26b485785729d80ae1830f80926bac26df

  • SHA256

    7e474bcaeb24584b51ae8c8cd5526bf11e84cf406598c4f2dafdb1aa705bcc07

  • SHA512

    02c07be24842215e757cab6eeebca17e92d78dc8dcd36885dbe4b9cd35389360dee8033037d012a53c65be7493aafa505413142bc902bb6b6790b6374ccbd595

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9UwFVmVy:V7Zf/FAxTWoJJ7TiwFQs

Malware Config

Signatures

  • Renames multiple (3883) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e474bcaeb24584b51ae8c8cd5526bf11e84cf406598c4f2dafdb1aa705bcc07N.exe
    "C:\Users\Admin\AppData\Local\Temp\7e474bcaeb24584b51ae8c8cd5526bf11e84cf406598c4f2dafdb1aa705bcc07N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    2a1cc2ea4767a986dcc67fce2b839269

    SHA1

    784569acfdedc2ba85d3da22659c5817dbb3cb5d

    SHA256

    101d90ce7c74031cf7e42bc3c3896124c421026d32dd77659512191905c675c5

    SHA512

    622aa3045aa883616c2a7fb3cc904eb61ab0468547d710830b99d70a725c7352550e9a8429207f6e237c0873094b29d1aee3c7737a1b7b192791310aa8565fe8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    cc2ffa429df1b159f802fe94c9de467c

    SHA1

    370e0062e38288c956a959a8c4d4678a96c374df

    SHA256

    3de26331bbf485af4a2a1086a59e913e4764a7d5cf291e7c9d0fd25e4187ca9e

    SHA512

    f7ee9d3a17302cc95a08fd87cadfd9eb9e8f17577c02886e51d9e561b3c313a43c4e7d02d787d869ec2977198fc9f70b9d11a28e54e6b85f053dbb869ed15759

  • memory/2224-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2224-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB