Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 20:54

General

  • Target

    487b79584120c28d62b10e66985252ce30763bf137b5a63f364dd153c5eef87d.exe

  • Size

    79KB

  • MD5

    979b4c46b8dd9c33fddef27416e5c792

  • SHA1

    ad878cfa522189c7a58f352088ceab8224fa4a80

  • SHA256

    487b79584120c28d62b10e66985252ce30763bf137b5a63f364dd153c5eef87d

  • SHA512

    19749ebc6dd5bf8f104dad9aaf7d45b3667bc296bd2c790fce9a177cab921840faac590ef50f7b1e3f0a1fc3e91ac7532227d853cd7058d0a1ad85e246508486

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9GR9BT37CPKKdJJ1EXBwY:V7Zf/FAxTWoJJ7TsTW7JJ7T6dkjkN

Malware Config

Signatures

  • Renames multiple (3599) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\487b79584120c28d62b10e66985252ce30763bf137b5a63f364dd153c5eef87d.exe
    "C:\Users\Admin\AppData\Local\Temp\487b79584120c28d62b10e66985252ce30763bf137b5a63f364dd153c5eef87d.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    e151e92025f9ecaa6af448e0a90783c4

    SHA1

    41d403629a852e9f45e6fa92590f5d2435272da5

    SHA256

    afb94ccd0f7b8d7b48833c0d92c4b1b4cd89b4d010449ffb632066afa606d5da

    SHA512

    15334f83a5c71401104df8f7a2ab48433647fb00934e34e64353bcbe4fcb1274bc7b93bb6f569af1a25c5b90e5e5eb9027cc29e8b6853b38515f430ea0fb8842

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    a6b948eeefc218d61366c4ccbba0ed80

    SHA1

    29e77689678461b67a419057bf8e88474145d007

    SHA256

    9e8b6a66638f6c0950c4ee572b4f78fbf6540794f1357925176067213fdf9c94

    SHA512

    3002d9b9084a8c2de6ca2b835586d1fda1b261903604c6fb7b8bc1ba9ff5a82612709cf337ae4af7bfac3fcb671737e94d1dae44788b794c93fa147db3e52cf9

  • memory/2440-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2440-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB