Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 02:29

General

  • Target

    1453296982978cd54f835cf9cdc98f128ab387dd3b914ab096176ba567868402N.exe

  • Size

    63KB

  • MD5

    d147377b5758551eb1130a4b98d7a790

  • SHA1

    8cb79a4927cdddb13bbc111b9943906a4574a21c

  • SHA256

    1453296982978cd54f835cf9cdc98f128ab387dd3b914ab096176ba567868402

  • SHA512

    b03739824aeac64c1c1639d4034aec25b53f56ee43fe10ef44cba954c64ec05016d60f9a3d9ed0a7cb4becd665b94c3f2bd5328c9166f5f622c6ddb79b1de5a9

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TzJv+o5oJxJ0PYXA5pYxbOpCpFgTJMTTLG:fny1t+o5oJxJ0PYXA5pY1OpCpFgTJMTm

Malware Config

Signatures

  • Renames multiple (3723) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1453296982978cd54f835cf9cdc98f128ab387dd3b914ab096176ba567868402N.exe
    "C:\Users\Admin\AppData\Local\Temp\1453296982978cd54f835cf9cdc98f128ab387dd3b914ab096176ba567868402N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    63KB

    MD5

    4ef6f4f988a6f9cc830431e0bdc6aff7

    SHA1

    25d2f3ae53c36d404cba9f6b09dd75dbd2db904d

    SHA256

    13ac278ba8baa13a33af55037d688ca7aefcdb96f8b79fef2160f26ad640188f

    SHA512

    e3652dc81e50bcd0cd7b97dbdad6e26430b96c3eaed52f37d700a74b43fc8e1ed52ec4935ab5c03a2eccefb738e8b3994fbf09a1410f2e50edb7535a8484b814

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    72KB

    MD5

    7a18feae49fe3e37c18bc232b5c6cf4b

    SHA1

    9e349d9dda97eca6288ab007b236c1be81fcf17e

    SHA256

    97e6e88951baedcb82a2217842d614e118d54ad4a08fcaef1e61bd5fbe605973

    SHA512

    c91131095bd29b3130b8bd32142977181273345d89b73f6e3a676f450411d3fb38c58b3dcd3787b5a69a8165ea31bbeba12dc72e923697f682ef2e1ebde4fcbe

  • memory/2400-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2400-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB