Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20240802-en
General
-
Target
sample.exe
-
Size
10KB
-
MD5
0e7215901aa61f182a5d229d289b073a
-
SHA1
a34cea415bc7d07d93c6b1b02e2a2349fc3b38b8
-
SHA256
6cd338d71c9b2e482089e164a2d58f03e0619734b4436fb745df4f57527eeed6
-
SHA512
d2d20855e7365c9db534b9c70e687c65503147619b18656fcd461424dcb7ccac32b4d5de029e7676037e78d9b2bb616688763b16559f262a34f0d11415c0b203
-
SSDEEP
192:X7slLwEkBoDGZu6qdkXn3sHBrDPNCGmkVQLrF:AV8+G4dk30XYoVor
Malware Config
Signatures
-
Renames multiple (276) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2656 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1508 sample.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80B
MD5725d8afe23ea905cae56f435fe7c44b0
SHA1897edb3424b0598dde41c6974cfc8bb26aef156a
SHA2560710c738a7936f0cf6d2827daa2976cda07b07cbb4ff5333fe2ce1f0e93875e5
SHA512864bd366efcaeceec6be2cd773837786991cd8f7f0d58d753880b519edd060e2a55f8893ea8e07e3c689285ebd3455b3331aa7a63ed8fc80a2964de867a340d1
-
Filesize
16B
MD5251f99e319b5addea972a7e58f2be094
SHA1127a338fd88e666ada53b5103413dbc492cecad5
SHA2560e6ea5e699f87bdc18dacc45e0bcbf94eb76a636eea0484a0fa941e03cff7810
SHA5120353e530db30e57beeec454cb93ed42f66fd7d635d9c56632ca95282e2abea085b1d9efffb294c866866f90e64ddb3e3fa4efeb96f59581ba39fe4cf7b486358
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.morgan
Filesize48KB
MD5991fcabbf3a527123ef4c1951f956883
SHA1a8fc797ebce1ccd72ff66b154e4585bf212bb132
SHA2565677abccec25c554311f47fd50bbcf4507d51f0d1f92dd187ac50301bbb061c5
SHA512298dbd5aa8231feaf1d8fa7133066f503bd38af16c04b11ba06b7ed1ec13485c6b432a1b87faf689200738393435b48081c7a8b31ccdc043b24695e103b52253
-
Filesize
79B
MD58ff2adccd1e2672913cb387e285cb34a
SHA12bc418de0dceb2685bafa878ea5877ca354ce028
SHA256e75362202b59fbe8a6eb8b50fe0790fbdcbc7266279b4ff225bb7c9435094cc5
SHA51284d07a03b49ce432928d92bb6680c4219d205710907122264a7cf07315ae9b98f04a0dd27dc6aba8c812975db65ba82a602066ccc16fe9a72cba9134a78fd068
-
Filesize
16KB
MD5a2f11f808953b007833e4265297e78ac
SHA16229d4583412f486e72e1c56a095217527550cd9
SHA2568ae3dfa805195c31fff17ce5787adb927bcca53c323b17d6568a8107f02b7ff6
SHA5123e6f065a18774e4764bc8f5c426b611817f571ad18a83b2fa25350dd6d726d99c9676b49f3ac749a0c8734d16c61fe9e7373aac4b48e508d6d60752a090469a0