Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 06:45

General

  • Target

    180ec28a3a2e21d50fd730247bbd019a36e543f9f54e2c17b8925fcdb1b333b3N.exe

  • Size

    107KB

  • MD5

    517889e5ec8c2c08e6ee5b851a1825a0

  • SHA1

    393d888d6325f48a5169029585189efd3f0c0c78

  • SHA256

    180ec28a3a2e21d50fd730247bbd019a36e543f9f54e2c17b8925fcdb1b333b3

  • SHA512

    97666799cfc1ac4d6253bca936eec01590b3fc49eca8588538735a3bd928ab85107170e16ae3bdf86febeb6ecfbf61d02dc08d770ab2f4af42cfb7cf66bc8d27

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyoKIKIKNKnF3KNKnFfTW7JJZENTNyoKIKjeNep:fny1tE5KIKIKNKnF3KNKnFotE5KIKF

Malware Config

Signatures

  • Renames multiple (3457) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\180ec28a3a2e21d50fd730247bbd019a36e543f9f54e2c17b8925fcdb1b333b3N.exe
    "C:\Users\Admin\AppData\Local\Temp\180ec28a3a2e21d50fd730247bbd019a36e543f9f54e2c17b8925fcdb1b333b3N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    107KB

    MD5

    bc7cffbf2bbbb5c393d77705049ed538

    SHA1

    8e545565b930e19e8d6fdc751edd0ba1785d9bcf

    SHA256

    0f39c94cc07252e4e26ee6112ae063359d172c374a78d95692ff0507764ea9c1

    SHA512

    79a82c497c4d4db8cded31f76011e78b20001e9424753ef7f27a7d51b52af4023f8915538703809e09a938d02e69e4069252b9f471bb0757f361c5dec245cc40

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    116KB

    MD5

    c79004fc737c1268aac6fda525abe768

    SHA1

    982aeaa9290f4e6e600593e246c61094409f77e0

    SHA256

    249dfb8e13b2a79b1bd39f68940e018a5df49ba4fd7a87192a3d34d7fc4e3a12

    SHA512

    d4e1b6cfe5eb6378b1d657512e97bc50460a42f72dc97d596559848cf1e842ec7b6c8730f6a218c8b34e791aec23e57d86d6794647b9985d4821cc552688deb0

  • memory/2408-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2408-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB