Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 05:47

General

  • Target

    80da7ecc03933b1528938805801458877ca984712be178c9876f619eb66624f9N.exe

  • Size

    49KB

  • MD5

    774c8742a247dffdeaad55e428616390

  • SHA1

    576b6cd209ddc3df621bfed9a46fd668c07855f5

  • SHA256

    80da7ecc03933b1528938805801458877ca984712be178c9876f619eb66624f9

  • SHA512

    628acc0e57d5d9c150080f68b1f87a02f480ce9d421274aa73886db53c9b4f0b6e5e20a49bc53612d73e8f5b157354d03a8921814300b06ded41c6e045c4fb82

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI97LjLNLjLqOZ8W8x:V7Zf/FAxTWoJJ7T1vJv2O6

Malware Config

Signatures

  • Renames multiple (4669) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\80da7ecc03933b1528938805801458877ca984712be178c9876f619eb66624f9N.exe
    "C:\Users\Admin\AppData\Local\Temp\80da7ecc03933b1528938805801458877ca984712be178c9876f619eb66624f9N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    fd4de5864ada01f8f6c5f23a7517fabc

    SHA1

    eb08e5d8608ce96afc85c27c42dce5f891f286fc

    SHA256

    a7c928ec54f7474b70519b05d68a0f676da35315dcb067de4f91ab8f60f0b4a9

    SHA512

    f61cac28d23af5442bae6eb8864d4665d7a9d6c1b3d647beba906c54e541896b8f4fb16ba6d78134e4341909c989f9d4bf3a243cde8654653dce43c9df4e7387

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    149KB

    MD5

    c8fad5a44370104838e6e597addd7efc

    SHA1

    f81ab8a45058993660e25ac6384f886d36fece38

    SHA256

    738c9e3991374ca24e744b9dd2e5d3dc3409a79ac81b2035849046500af79e3e

    SHA512

    0c53299bdf2c777d750fc9a3d4a93c9953675ca2754ec02fe55586514275f88bd92bf5003412c6573b08dc84444d889f68176ddde9dbba795714d21d2adcef9f

  • memory/2972-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2972-966-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB