Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 02:49

General

  • Target

    d537329a9b3c25b89f23fcddd4c3f154590078b1ff52686849cd54790af24bdfN.exe

  • Size

    54KB

  • MD5

    d20e88cfcbf549c043e48b3633c7e230

  • SHA1

    e6b18a75d4bf07317a8dde41c6464f1f33990c36

  • SHA256

    d537329a9b3c25b89f23fcddd4c3f154590078b1ff52686849cd54790af24bdf

  • SHA512

    7be53cd8a53e1fbbed6ad424629602de03a4b59882935d435fb43e53c557fc35d68ee9d46f1e6c0f2c40a29952ab54165e972943a4ee2799ff347bd2b55d4470

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2r9:V7Zf/FAxTWbi+

Malware Config

Signatures

  • Renames multiple (3733) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d537329a9b3c25b89f23fcddd4c3f154590078b1ff52686849cd54790af24bdfN.exe
    "C:\Users\Admin\AppData\Local\Temp\d537329a9b3c25b89f23fcddd4c3f154590078b1ff52686849cd54790af24bdfN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    7f2261a87056cd789ee6e5ccfb9ea8e0

    SHA1

    bfb9ac97a5743bc002789dcbba9c699313b45e1d

    SHA256

    b249a963acb9684407f95d3588ddebe9386c56d4fa9fff51da0b3a69d86b682c

    SHA512

    f22f1e72ee7a9791ffd5c41ab5cb5e0c053a1d79f4f45c5ebea400b19aad2ec0f0517c87fab7dc21fdeb1fd0bbdcebee3f23054b423d39adac9750b82baa15d7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    8a7b590ca43e6746963a878e9bace340

    SHA1

    81abc7a2100d9bf95215eeaa728cd250bb9622bf

    SHA256

    64be974fff8553d85b46bc87f0aecf81b0921b9cdb2adc777f93824aa443e1a4

    SHA512

    7711ee84c316c2d04b1493d0d4b63a09ba985bfce5a665a675d443a7a0ad6361940f9324d3183336d09e0c1e49b7804b7a6adc7d9316f701c51b9a528d8af200

  • memory/2344-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2344-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB