Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 06:10

General

  • Target

    abc2c80451f952de2915baeedbc14518d71bf7a330b47c4e88fb1327cb3a8f8eN.exe

  • Size

    73KB

  • MD5

    efcace074b231fc0367ee045bf3a3f60

  • SHA1

    a6b7534f8fbac6efb792b48a2da5d9ec3896d480

  • SHA256

    abc2c80451f952de2915baeedbc14518d71bf7a330b47c4e88fb1327cb3a8f8e

  • SHA512

    60c7737adbae7647210c524440091adfa20ce549f948f7eb8640a492e485291cdef4a1913ae0e50ab647c4f3e5b63865f082f035103846c313818498be68f829

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9rBT37CPKKdJJ1EXBwzEr:V7Zf/FAxTWoJJ7TPTW7JJ7TWrP

Malware Config

Signatures

  • Renames multiple (4649) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\abc2c80451f952de2915baeedbc14518d71bf7a330b47c4e88fb1327cb3a8f8eN.exe
    "C:\Users\Admin\AppData\Local\Temp\abc2c80451f952de2915baeedbc14518d71bf7a330b47c4e88fb1327cb3a8f8eN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    74KB

    MD5

    e3312f2662e9d3cb0aa5612658a41b32

    SHA1

    54a59d1960c2f7faba246dc5411633fcd6288eb4

    SHA256

    6158a41e745df2718ba30152ff90478615130b563bb5fdc6a2b326be34c705dc

    SHA512

    4e0c0fb4cb5a1874b58af3148996d71b41373f9712c874a363ba2c97e318ee8dacd3cf151d66fa6751fb180c127c4ef78aed29bf6bdca4b8b531af7706ee64e7

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    173KB

    MD5

    7c4d604db0d077dc98e14c1a4bc9906c

    SHA1

    0b0ed68df57e72cae575191ca63c168a4f42bf6e

    SHA256

    c4d369ba5741df9d169e6eb98c87c15ceb40ee7e2da94792b835d6737049e00c

    SHA512

    0ba31f55bc19a73a254d8157c60ea029883ac1aa5c33c0517025ece03b294cacef2959fd4de3f33f93c2c63cfd801e44ed2e71ed18948fcdf61051962c5ed84b

  • memory/1328-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1328-902-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB