Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 22:29

General

  • Target

    1fd4f12237ced5b6b1cb0ecb4b09e9d88bcf0981f6d02845042f7cefc45d7f2cN.exe

  • Size

    29KB

  • MD5

    fd8b750646312cc62b65667afcfaaae0

  • SHA1

    33fe7f3655eff2b9a902c100602edacbaa3cae2f

  • SHA256

    1fd4f12237ced5b6b1cb0ecb4b09e9d88bcf0981f6d02845042f7cefc45d7f2c

  • SHA512

    5adebd2cc188e46a667099a42bc5fde013c5dfb871c1678afa05f3c1dcb6eaf053ec531b641b8a346805c62e3e504b5631166a4a21f7fd2b9e599589c420fd36

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9yGH5BH:CTW7JJ7TPTH

Malware Config

Signatures

  • Renames multiple (3432) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fd4f12237ced5b6b1cb0ecb4b09e9d88bcf0981f6d02845042f7cefc45d7f2cN.exe
    "C:\Users\Admin\AppData\Local\Temp\1fd4f12237ced5b6b1cb0ecb4b09e9d88bcf0981f6d02845042f7cefc45d7f2cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    29KB

    MD5

    b715046d841597e8e6510c1b49bbef56

    SHA1

    e87d4f4b280ceb558e41869a85065b2296b57f22

    SHA256

    33dff7e818cc5b5d4686be0b483f02e4742dc7b6e8616a09d0edb597846a4111

    SHA512

    c9887906721ebf714afb00e88a81aee024f18bbfebfe02bd89dc135196c6f58a8e8ca6b3064af41f34008bed7d59d7528c47c928ab9dd0098c62001ff1a17872

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    38KB

    MD5

    5984d3c48ed621d1d23f9e92c321efe1

    SHA1

    756d2271819105dd5fcdfccc9631d5ffe07e3fb4

    SHA256

    906b598f7ca650b95cbe966f470240b61bdf6cbd4ab4c36d11acd3f40b84efda

    SHA512

    4c1dcee4b1de66638672b939b6d6208bdc6e4a3101238f8cdbffdc12b5434c03804c680c962f70fbeebca9e3424b3525242d79f8b21ba1de2184592433651c3d

  • memory/2196-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2196-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB