Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 13:50

General

  • Target

    b05fe0f2dd97e5f9a905aea6d418b2ca5e8800cea2435f70e69e4eb8006369ffN.exe

  • Size

    38KB

  • MD5

    69f26e9d99efde4af0872226dc7481a0

  • SHA1

    2dac8a49cbc2d1972f3c6e181739d304fcfd1e70

  • SHA256

    b05fe0f2dd97e5f9a905aea6d418b2ca5e8800cea2435f70e69e4eb8006369ff

  • SHA512

    65aa1366392b2d7bcbddaaa9649581aa65ba18c4960b1e103e18af3b272b81b9a2746d75803b31564585ea6bd737cb8d10d719aba426df8ecb6d6559395f4fde

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATBWvyBh85c54w/JYWJYZ:CTW7JJZENTBWv361JYWJYZ

Malware Config

Signatures

  • Renames multiple (4678) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b05fe0f2dd97e5f9a905aea6d418b2ca5e8800cea2435f70e69e4eb8006369ffN.exe
    "C:\Users\Admin\AppData\Local\Temp\b05fe0f2dd97e5f9a905aea6d418b2ca5e8800cea2435f70e69e4eb8006369ffN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    51cff4e9f95581630296c6a0893f3341

    SHA1

    164427b0c79a198d72f3f42393fe5559a6188f04

    SHA256

    fac8050627e4c0bc4330725f8a9d620cd7a434b51c1a0b50998d6864c84e96c6

    SHA512

    2d576db1b17f59ca6154ccdb4c2393f2595b12a28229c352d74d3b4d4a889d204f4bf100d63b451a80707e2ca121bff9c03863d6b62254e9f938d7d75a124d26

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    137KB

    MD5

    faa7c1359e085f0601c010686156b9d3

    SHA1

    8ddf9eebf2cafa47dc9893bf07de17c835be6268

    SHA256

    b7661cb57b24d2a21f43f858a4b92dd3e7e5a90444610124c2435802c50e835d

    SHA512

    73e2ac2aeaea89db47eb47a8beb2a20bd54756ef52888ab0e0c776e177a79b02fec28eb2e9897b5877001826f756f7af69e7e998c868552cd9f8e273e5a292d4

  • memory/3436-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3436-930-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB