Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 03:53

General

  • Target

    fa07f8a8d6fca285a328fdfe09c2cd09908d0333e5365c8143dfd5ee5c776634.exe

  • Size

    76KB

  • MD5

    a217184e32bc2be542231eaf972c5976

  • SHA1

    527edbda97bd0b92227238a99c2f7033f483032e

  • SHA256

    fa07f8a8d6fca285a328fdfe09c2cd09908d0333e5365c8143dfd5ee5c776634

  • SHA512

    e9cd4ce0cf923e96bd2da0214bfa71bd82e852894674db447c19a4e88aa4e49fdb450da30cbafeef9bcfd27d896d52e8dc15662f0e0d6c25245a283def5d3253

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8wYeHNm5EvDxfIyKoIWbsHfySkT5GeCyi348oWGh:KQSodYeHNmkDxfIyKoIWbsHfySkT5Geb

Malware Config

Signatures

  • Renames multiple (3490) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa07f8a8d6fca285a328fdfe09c2cd09908d0333e5365c8143dfd5ee5c776634.exe
    "C:\Users\Admin\AppData\Local\Temp\fa07f8a8d6fca285a328fdfe09c2cd09908d0333e5365c8143dfd5ee5c776634.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    67f779ba07cbd72cb9c68b6a216eece8

    SHA1

    c8f6f5dbe816c006283b10b6f12ca9fb21ab03d7

    SHA256

    a58467dfeb124663456953fd5d55e11d75416000f740b8f299dff887ff34c361

    SHA512

    0c9c9b491bb360c03f5fa7e6f2e84fe1ba4b7195f858338f9b06a1562dabf507408f43371ef0d59c18c1b36c48ac433eef9f94836801b3b957969049d4e4611c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    85KB

    MD5

    783c88e93fa68be3c65a91b36b8ebf82

    SHA1

    36c83cbe1c353306171f3f61f3934bf8e496e5bd

    SHA256

    9023e1c668ea444f2f2ed025f010156e535efc20f192467f3640affee76c8b3a

    SHA512

    4508b6d59bc735e29f0dc18e0f1a36b8f542b646a3c8ad47fb948d5194de2990e7ab6dfea4188916f334d229077293b00d9f0a1b70f37e1ec4e1f0a973506daf

  • memory/1304-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1304-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB