Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 13:07

General

  • Target

    e8ccdffc23e1d38cc30ef60379c461c87aa1e9a9357dbc53486c3c30b1ad9115N.exe

  • Size

    82KB

  • MD5

    a4f0edfbc822d4dcff568a46a60b31e0

  • SHA1

    e90706e8cfee9e0866bed60220f73c123b5d7482

  • SHA256

    e8ccdffc23e1d38cc30ef60379c461c87aa1e9a9357dbc53486c3c30b1ad9115

  • SHA512

    cf60a2fcdbbda5e238d327769411a4064d00ef39fc9c2859b183aec938d07b170da955c23f10e66ae4200386645ee2d954b146b1b9d3dd08e9b9a1d1e19d75ff

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7T1+w+fTW7JJ7T1+w+1NZ:fny1cVocVh

Malware Config

Signatures

  • Renames multiple (3089) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8ccdffc23e1d38cc30ef60379c461c87aa1e9a9357dbc53486c3c30b1ad9115N.exe
    "C:\Users\Admin\AppData\Local\Temp\e8ccdffc23e1d38cc30ef60379c461c87aa1e9a9357dbc53486c3c30b1ad9115N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    82KB

    MD5

    558e271eab4c66651a422c291603f353

    SHA1

    f96ef8a58f1eab75c1c31ee5f34455db44c6c785

    SHA256

    ce1bc790f2d8ba7a38538f99174be6aec7d5335818c488e67a2922954b2bf28c

    SHA512

    abb32f5c21ac7f995801f46b48f2912dc2b3284a62feae509b68039336b904f1d269d7f11370d50dab7c5384b0c9c56bee533edfcd832a5d8e4bf7219cf55f9c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    91KB

    MD5

    424c69f61f1f6631569062ed38cd3f7d

    SHA1

    448673d22876e72ea76da0cd598fb58b74350a09

    SHA256

    d77fab0c26d3c8dcd9a1b39f578d33016566d2d254c42d3cf346beee7355c4bf

    SHA512

    e2d6851d567f707c60612848c06087bd3d0f2b34c1f0b205bb8df1885cbe8e1c2b6c662d20427c0ca531be2c20086807390ffd604336a5ffcf98fdbc1004df8a

  • memory/2452-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2452-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB