Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 10:30

General

  • Target

    f0b78f9d48d28917f633781f4c464c6e3fa671981fd0376d5f1cba3e17b6ce66N.exe

  • Size

    59KB

  • MD5

    bf098a87c3fcf5c1ca73663bdf797fe0

  • SHA1

    9305ef006da8145896b563cbbff665575d4fddbb

  • SHA256

    f0b78f9d48d28917f633781f4c464c6e3fa671981fd0376d5f1cba3e17b6ce66

  • SHA512

    79615fed4da1f501cbb1256b5bfcc149ee5eaae10dc6acb15fc12f0e2c6f824cf22c6d4b2106c20b6fe89bcda8f1517a25e10d9413c5aeb4d2d5d1e03d351fc8

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJl:V7Zf/FAxTWoJJZENTNyoKIKMX

Malware Config

Signatures

  • Renames multiple (4641) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0b78f9d48d28917f633781f4c464c6e3fa671981fd0376d5f1cba3e17b6ce66N.exe
    "C:\Users\Admin\AppData\Local\Temp\f0b78f9d48d28917f633781f4c464c6e3fa671981fd0376d5f1cba3e17b6ce66N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    59KB

    MD5

    6165526c12e2835f21247329a71ebd07

    SHA1

    ea5b9016bc98a3ba579a15758b5ecaa4a5d40add

    SHA256

    699512f6e16b2e7cf4aa3b774725b84263918a42a85ece843adfb53b973bf78f

    SHA512

    19d4f56c54213b52d20519eb914533438a85c411f645df8952888558315f91407008c121a871320b37c7d1ba52385eee6e080496f95167fcaea4d01c271d79f1

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    158KB

    MD5

    b705262246c1f96738e15d88bccff1dc

    SHA1

    b205cad5880716db43c485de08c13776534842d2

    SHA256

    1919b8213cb3f7e520d8157cefb5ac9b2b5c86bf24c132f28600e7d69cf3edce

    SHA512

    21a40ab71c2f37e9efadb06e53b3f8f747e7038770a028c3de0680e0c9ab470dd1ab01d22d87dd8cf9030b520b6b31422a6e889e48547d13bcadee58f3946cd8

  • memory/2804-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2804-918-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB