Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 00:06

General

  • Target

    0e3bba75188300f09427c396d1ccea5ba0db4fc261d4d5565f8d214a761bb577N.exe

  • Size

    47KB

  • MD5

    fd6581873a05f1b920b12d260d8cccf0

  • SHA1

    5f0bd293a12d7ea0855852ddb10f2ba28014720b

  • SHA256

    0e3bba75188300f09427c396d1ccea5ba0db4fc261d4d5565f8d214a761bb577

  • SHA512

    eb3fdbdca917593c97c58738692522b1504afdd25e05a0563987f49981d7d0d6f5f0ec56d3d71891308169fb66adf432e67c49142fc3d16c6ae33b335c2f7b56

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9r:V7Zf/FAxTWoJJ7Tx

Malware Config

Signatures

  • Renames multiple (4679) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e3bba75188300f09427c396d1ccea5ba0db4fc261d4d5565f8d214a761bb577N.exe
    "C:\Users\Admin\AppData\Local\Temp\0e3bba75188300f09427c396d1ccea5ba0db4fc261d4d5565f8d214a761bb577N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    c123c75e2f8685f09592fa715f0330ef

    SHA1

    05b0fcad3f22e2d592477679ba5d30ba080b2f56

    SHA256

    3957c98315b4c7ef18df68ff57a632758847591d3faeeec1dc6789771f015ca4

    SHA512

    413988224394af053092c6ea2df64f90791a5d3be36da4ac62d5c3d8074961f4c852ee7aa3dbd66654f4e35bd520f6955f5f7dd21c37ee328173b952248769b4

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    146KB

    MD5

    f473aa28cb15ab5cd01bbf1076c1c1eb

    SHA1

    55a661d62a7880950aca4ea3b52a48b7f4bb664e

    SHA256

    ede1782fd3d1bbd82a4694ec0a7e06967f81b7065ebd57a74cba0317cf0c90ed

    SHA512

    f3a105d54e416f322f54af65252f8763774074d5894a6a8e2e32ea0719e9d58dbe505c083b1335757c212f3d41ecea059731eefc423c7436436f32226cebcd91

  • memory/2012-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2012-1012-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB