Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 06:57

General

  • Target

    15663be555ee19affc135c03c3ecd82cc26e8ca59461dbb5d7a03731abf2fe1fN.exe

  • Size

    59KB

  • MD5

    2370ee7bdbe16a63afeb506101828840

  • SHA1

    43da8736810d364ac1596c3c6920b2d5b797f01d

  • SHA256

    15663be555ee19affc135c03c3ecd82cc26e8ca59461dbb5d7a03731abf2fe1f

  • SHA512

    9e7793a0c29bd68362502c4af0ea10e4ef8ff9e0a6db0e052029503cca7e669272f220fa185f61218ef4f8058e96a6e0a2ceb0dfae1d9e5ed72e9ed31377c3f9

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJTU3U2lRtJfO5mdGwmdGoqAJUqAJy:V7Zf/FAxTWoJJTU3UytJfO5mdGwmdGy

Malware Config

Signatures

  • Renames multiple (3164) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15663be555ee19affc135c03c3ecd82cc26e8ca59461dbb5d7a03731abf2fe1fN.exe
    "C:\Users\Admin\AppData\Local\Temp\15663be555ee19affc135c03c3ecd82cc26e8ca59461dbb5d7a03731abf2fe1fN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    59KB

    MD5

    c48ed46f4d7c75aa6a6325edb68190cc

    SHA1

    91737e7e7962b641fa7a46e859c3d185aba02c7a

    SHA256

    f07df3467ebb23db59e39e3bcbad7bb240722134dbdeb6c3c72b31d27930f4c6

    SHA512

    9c34229e901e0657909cec1f4134aae80d3c037c55afaeaa18240bcef0bba50c295e8e4ff71874bfc7fc3e42ce80070315d7c082d17a95734dbdb89cf11c8f61

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    68KB

    MD5

    ad6b00218f8e518c515c6f17c3ef90c3

    SHA1

    3f09248d5c6880bfba180fbc027d52fce75e7154

    SHA256

    31962feb43467231187d4e66abdbe725034774173d789b16a48282b0cf396f71

    SHA512

    cda3feb43d40669957a5b88b6b3f5755393d5f5eb2f1e9b97fbec4ade0c4a7ddfac8e6d857ac4de192a05832d1593310cdbfa0ca3d7c3a56b2a4a7ff3de59620

  • memory/2376-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2376-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB