Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 05:46

General

  • Target

    a77f2948ff4f8da394a849cc93609bbb954ab42294b2c5612ec66ae512136d0cN.exe

  • Size

    60KB

  • MD5

    305a3a3058eb3197bbf82a64b8431ae0

  • SHA1

    2b1bc4b2911ee92ff6eb73a684d1bfcf157edef7

  • SHA256

    a77f2948ff4f8da394a849cc93609bbb954ab42294b2c5612ec66ae512136d0c

  • SHA512

    3917240645a2acd7ef93f63c40cc0cf14a106092d2953278a3c758474c362da4eb071a6161f0d5587c5253a798b37145a6bd49d9877c0eaa8d494e25bc8f8a4e

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIR:CTWn1++PJHJXA/OsIZfzc3/Q8IZaif

Malware Config

Signatures

  • Renames multiple (3116) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a77f2948ff4f8da394a849cc93609bbb954ab42294b2c5612ec66ae512136d0cN.exe
    "C:\Users\Admin\AppData\Local\Temp\a77f2948ff4f8da394a849cc93609bbb954ab42294b2c5612ec66ae512136d0cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    10d71986302021528977721d082cff9c

    SHA1

    e8fe9464c876c75cf159e27b16567fcd10e0879b

    SHA256

    dd881c8d1e0e584c063a7d2f6a66adb72d8599a98e294e8b5eb2394ca77f38d6

    SHA512

    a15639473d852432a67df8f8a4b243231cef198260c803b74aa29c2e2dc9ffe479fadbc99ffcb58e2fbc3b6e62763892c180fea6533963d21cc147e357f5c7c0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    69KB

    MD5

    433ae09d216e271f38d646d77926fea4

    SHA1

    4b012c08185598916d3bcd5db06ab37c1251a5df

    SHA256

    5a511640c441735bc56e383489189cf79f56c1efd694195a41df3ea4a5bce2ac

    SHA512

    6e7558cf9a68fe0b0bd0a3b3948565c49d49874b97a92fb1adea48490cd33154e0c2cb7a60b2c384c8f76d98b05435cbd85a4ec309bc616d6a271765516da5c0

  • memory/1648-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1648-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB