Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    59s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 19:53

General

  • Target

    3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe

  • Size

    683KB

  • MD5

    302355223951058450ea23d85512b84d

  • SHA1

    6bc5d29f43d2e242d81492cc03976eb9f2b87eb0

  • SHA256

    3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c

  • SHA512

    4f83182f477f42ac35ba990d73a2ff2064e98a3b0352f2e5d735552294abe2e72f0793de8bcecd0521584a95a088caa8a96e798282283232d5e2130d219e03cd

  • SSDEEP

    12288:aeFID53KoNw+bCUKklI9ufQ2XqJmrsZq4ZiohfzFq69:aR95Nw+bJ3lI9uB/48Ub9

Score
9/10

Malware Config

Signatures

  • Renames multiple (600) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe
    "C:\Users\Admin\AppData\Local\Temp\3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:2292
    • C:\Users\Admin\AppData\Local\Temp\_mpextms.exe
      "_mpextms.exe"
      2⤵
      • Executes dropped EXE
      PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    85KB

    MD5

    47df83b34e42f95435c7580b7dd00f9d

    SHA1

    a76c9c932b9445292a1ca944691401e63a1feae7

    SHA256

    0a412e5f362c963e7f2ed1309050974c1a70f34ab99fc55a6373102d12b1f7bf

    SHA512

    8485c38a7ca53c89aaa5b88049e6c568e72ecfb8c1db9d70226919758ecab56d68cfbf6587e8e6e006f9ef3217aecbaf6c34d9cac99872c9a0c5d0c04ba3a342

  • C:\Users\Admin\AppData\Local\Temp\_mpextms.exe

    Filesize

    597KB

    MD5

    69fec6fed212a3a310230606f4d4e9ce

    SHA1

    89573c0cd4933e59a0e49679246b96b34dd51b44

    SHA256

    6ab14e409d9d4910971d7edf973b5c25a269b50bdfc504754a127ff12e3ade8b

    SHA512

    964d9278a1b94792f73eb6bd8700dcc58d3a32153554390eb6f32b3525e63243905ffdeed6268b28690148e33d29fcd00fb39209580ad89581655acbad0d1497

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    85KB

    MD5

    ea015368d1dfdde0c74b4ef357d3dfc6

    SHA1

    9282a760216771da308fd4c994f43bc9309d50bc

    SHA256

    40f36c9ccd5d60276b8bc1228e0c005b5913de2ae8d905b6cf554d98b82d0673

    SHA512

    df662de23683b0e9bf6ec1f324f2b7da51158751b92a59a7dff4ab5b03ae7ad88f1c217b8376717e630df841ab922701c94fbe9939e8fc66daf46a49ba4ccea2