Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 18:08

General

  • Target

    59a16aff8fd7bcf2754486819258fae636589566ba1d727bc3fcc161f9e96af0N.exe

  • Size

    83KB

  • MD5

    a43f6b61103eef3170b80a11bd76b3f0

  • SHA1

    785f5b64da5a8ea56e8d9d1188f4a63b52657de1

  • SHA256

    59a16aff8fd7bcf2754486819258fae636589566ba1d727bc3fcc161f9e96af0

  • SHA512

    ad2c67882fd88896c18a10e1228d489eb149c532c8cc51b8acbffa18bfb654f24637e2446e86502e5f07c85b9d85dbf6d022a634608e6d0fa2cb7fa39a7e5c57

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5C:fnyiQSox5C

Malware Config

Signatures

  • Renames multiple (335) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\59a16aff8fd7bcf2754486819258fae636589566ba1d727bc3fcc161f9e96af0N.exe
    "C:\Users\Admin\AppData\Local\Temp\59a16aff8fd7bcf2754486819258fae636589566ba1d727bc3fcc161f9e96af0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    83KB

    MD5

    c31b51e57c1a5b2606ec80545597db1c

    SHA1

    efc4cc42d622f91f29c1c1d88b7254d304e24e17

    SHA256

    923eabef33bcde99426dc9a04aa24154bf161f343a23f87c5f42be5a7a9faf50

    SHA512

    8b6da786fd7bde9558b334c4e4530e2507d657a77c19f263bfa4bf8fdd409f308f9df690485b6ea0efa704488fc979efee0139ab05d418dd2e630086080fbc86

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    92KB

    MD5

    f3bd5b0efd634d544da9099ff08d4668

    SHA1

    2df483df0b0f9c5721ef444a9ddd083cffc7dcf7

    SHA256

    c9355c20836f34a129aac2d03c6fa5f9e2c2f6ada6a6916d6a0b5e620b958f8b

    SHA512

    1773ed5887221a47f7000d4c37c7ee388ef24382e0991fe23671b29b4753c7a62356edab82e65398bf4ba2a6006297315e99b1116b262181262060b6c8033d4f

  • memory/2708-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2708-26-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB