Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:57 UTC

General

  • Target

    5973e659ace973ba9a86d6c5e083f93a85cda64f740fe5a2cae69088e8e9deb3N.exe

  • Size

    61KB

  • MD5

    030b5817c5704e1f5c471737db210a80

  • SHA1

    489c0e0062fc239265c328f966ce8cf320694be0

  • SHA256

    5973e659ace973ba9a86d6c5e083f93a85cda64f740fe5a2cae69088e8e9deb3

  • SHA512

    241bc47e37d491885b663b577f9ec13504de12ae9b6c86ac2ba17b2a3f1b35918ce5c6c614fd7b5cb0550fb3bfcf0b5914a103d37ffdd8f1ee68d97f7d41faf4

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBApwp133EskmKQ:V7Zf/FAxTWoJJZENTBAOIfmKJfmKjO

Malware Config

Signatures

  • Renames multiple (3172) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5973e659ace973ba9a86d6c5e083f93a85cda64f740fe5a2cae69088e8e9deb3N.exe
    "C:\Users\Admin\AppData\Local\Temp\5973e659ace973ba9a86d6c5e083f93a85cda64f740fe5a2cae69088e8e9deb3N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    61KB

    MD5

    62f9079b05f73002ca4fd0992e280066

    SHA1

    e585e7994f8581aa897a0a5daf20180903f34798

    SHA256

    3c5f545c7db6902878d71ca716a6b038bb242cc53ed8d7b23596beef44a8e566

    SHA512

    08acb67bb07a242d65e5bb79d2f2bf4f6527e1bf91e2e9918d202d1058d8c5a2fa0a905f3654ebf64405df545ab1b33800f804ba2ee6f1cbb138184ace7d6c6e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    70KB

    MD5

    d0e94fd79f03b4594fa919a21b6e0bc9

    SHA1

    e3654fca3c489f5a0b3621addde71f3a6af7b6e4

    SHA256

    266cec8a50470c54460d6050365f2fb2ed9dba1c8fe76ab2c10e7799d08683c1

    SHA512

    df239d0620d72ff929e133179467ef61f61e30a94ee2171c3726bcb6d97a38b6baf857ef5b847556d4c0e788e24c0c86333f191b5ed880a0fa0dd4fea8dff179

  • memory/1416-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1416-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.