Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 05:47

General

  • Target

    80da7ecc03933b1528938805801458877ca984712be178c9876f619eb66624f9N.exe

  • Size

    49KB

  • MD5

    774c8742a247dffdeaad55e428616390

  • SHA1

    576b6cd209ddc3df621bfed9a46fd668c07855f5

  • SHA256

    80da7ecc03933b1528938805801458877ca984712be178c9876f619eb66624f9

  • SHA512

    628acc0e57d5d9c150080f68b1f87a02f480ce9d421274aa73886db53c9b4f0b6e5e20a49bc53612d73e8f5b157354d03a8921814300b06ded41c6e045c4fb82

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI97LjLNLjLqOZ8W8x:V7Zf/FAxTWoJJ7T1vJv2O6

Malware Config

Signatures

  • Renames multiple (3192) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\80da7ecc03933b1528938805801458877ca984712be178c9876f619eb66624f9N.exe
    "C:\Users\Admin\AppData\Local\Temp\80da7ecc03933b1528938805801458877ca984712be178c9876f619eb66624f9N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    0b45528e0e9fbdabd8e58b2036a6a356

    SHA1

    8dde6fcfcc935deda440d8c4c19577fcc3fe05f3

    SHA256

    1a69544a5a9c727f114d12194543d9059ec077eee3dd37090ca83c2caa1b4ccf

    SHA512

    06e5322ad2397f7aa1dab4f8114ccffa4ae67a83fc6b1943674a81d42d7b33e341e8862814348b1e38b8dcb190496845f86c65add985f9753e6807cac91b6a5a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    536a21a5020e4ccec7cd17cb94c412e6

    SHA1

    0d1a0261cabbaa2187817bb7e38faa387862967b

    SHA256

    737b5fa51e5322d79447574c3f1fecfbb75154dc237be00390471bf0c826a663

    SHA512

    a012b8aba129f5c4e3f9a8618724413043e382a90735b6683a3fa7d63a58ef0addf0a40869ed47e0940b0f335fc76951106f15c0f2be767a53febf2f9587a715

  • memory/2128-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2128-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB