Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 07:01

General

  • Target

    059ebd4f33dd987470c430d937dcf100b01cb15874b2a08683d3f6e0fb75fbacN.exe

  • Size

    24KB

  • MD5

    d03c22fdfd96f6d8938435fda8741c20

  • SHA1

    604389f321a20282ec6396ac100bc4bca3dd0db9

  • SHA256

    059ebd4f33dd987470c430d937dcf100b01cb15874b2a08683d3f6e0fb75fbac

  • SHA512

    ff6fdf3b39154d37ead82e8800f849048a6be017eb8401791af8ff7147fb5c9728f17f8c9e5105e97675f9e7583daa96cec3b726433f2afd1996cf33a0065326

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9AiOix:CTW7JJ7TF

Malware Config

Signatures

  • Renames multiple (517) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\059ebd4f33dd987470c430d937dcf100b01cb15874b2a08683d3f6e0fb75fbacN.exe
    "C:\Users\Admin\AppData\Local\Temp\059ebd4f33dd987470c430d937dcf100b01cb15874b2a08683d3f6e0fb75fbacN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    24KB

    MD5

    e280957c180dfadb38abc3654c58299d

    SHA1

    82e0ef1a6cfe8f5e745f28abab31a97261f2a88c

    SHA256

    4e32c875b757b23071638e7174edbbac1832f23b2639ab82ccd920ef15a1fe27

    SHA512

    51fff03a8e2721435f5adb8c7454f1379340eafbf611f048c1ad58ffb23f4e4b14d5c14db2c7b77c9a1687a55c0707d2a1a57b1742d1025628d8583566a884cc

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    33KB

    MD5

    a50d245e05598fac33f5ccd566247c1c

    SHA1

    791cc1e0db40b5583509bd46bbdf50431696707a

    SHA256

    71f3d9c9b528c387d265de0f022fb4eb188b6e6fc6b790a50c6637f013a129d7

    SHA512

    cec52994b4c6195246e3929418b44611a7e7637a60e0d5a159eaea53d3e1111103f3fe0778bf3e479a6050e81d2123bcc3d0dc2f22ead93f305ab04bb9cd972a

  • memory/1620-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1620-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB