Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 22:31

General

  • Target

    44c2b8fea18413332d67d3f9befd1d152be00ad50805d835348b8e4d8d3a01daN.exe

  • Size

    38KB

  • MD5

    3a2fdcdca92fdefa00dd318df5125a20

  • SHA1

    e38b37ba0c11f18ed1cfb85ba197d6b813819ee0

  • SHA256

    44c2b8fea18413332d67d3f9befd1d152be00ad50805d835348b8e4d8d3a01da

  • SHA512

    6c6dc5f9058cc57953a75ecb7997f4cb3d896760778efe6cf26f046e8b1f44423f7948d5a010d6a7d899634ea85005590f964ca4642946ac5cd27a0aaad90a2d

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATBaMYhOzB8:CTW7JJZENTBTYhQ8

Malware Config

Signatures

  • Renames multiple (3136) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\44c2b8fea18413332d67d3f9befd1d152be00ad50805d835348b8e4d8d3a01daN.exe
    "C:\Users\Admin\AppData\Local\Temp\44c2b8fea18413332d67d3f9befd1d152be00ad50805d835348b8e4d8d3a01daN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    8d952a65725978a791c46f5c7c0307f2

    SHA1

    280dae35abe3047cc9c830f9f733617541f35430

    SHA256

    db18742c1cf4644b2b92a9f41fa15610c43671b0d7972474546f6cd046fe5aff

    SHA512

    5de1e4f3e12d2694adf8b5ca2e26c9ab65ceab8e26d99dfc83bdca9ef20156d379d10e44ee83c5dcbd84dbb64a15c14e0abfe8abc0b4e4dd8ece2f0dc3ea09d9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    0f8c0d7527e74348b4f7365a9ba41bb3

    SHA1

    65f039cb78a8714d92e6004e02dc19c4663c2361

    SHA256

    de1b6f46588005a3935dc1ade2f3c8d78e2392ad70a2267617893b7eb5bece9f

    SHA512

    70be11fc15119f6b810baf91ef9bd1083b45e0eee7aefc6650d2b470f67f2991a0973c19887254d7c0ea050c2376a763ad2066d6c572f7aae8c6967b25473a02

  • memory/2652-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2652-69-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB