Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 05:21

General

  • Target

    c8746016e0e5fee269d9a00d4de9b924b5a09281e6e4c1f12c7f579587c8274dN.exe

  • Size

    56KB

  • MD5

    9c3e7a737e45f3907ceaabca522b10d0

  • SHA1

    3c8ad9eb44378ad9464c0bd9939169194101077a

  • SHA256

    c8746016e0e5fee269d9a00d4de9b924b5a09281e6e4c1f12c7f579587c8274d

  • SHA512

    5f13af2bb000afb5429f6d1c3828e38011782a981e70d8d7c239f551409388c1270dee1f1437871df6ccf03bcf78e24aefe5c2f78dbae16aebc429a7c632f1b6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PSqG:V7Zf/FAxTWoJJZENTBHfiPW

Malware Config

Signatures

  • Renames multiple (4648) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8746016e0e5fee269d9a00d4de9b924b5a09281e6e4c1f12c7f579587c8274dN.exe
    "C:\Users\Admin\AppData\Local\Temp\c8746016e0e5fee269d9a00d4de9b924b5a09281e6e4c1f12c7f579587c8274dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-493223053-2004649691-1575712786-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    c2292a80c994c780bfead908ddd57d8f

    SHA1

    6d29146df1a556013b92f62377c4e01e55ba351d

    SHA256

    9b51d936aaf5828ec11e8423bd504cbaf7c0f194542eb8be3513e128e610f917

    SHA512

    e23e538902398f8b0cbbb17c1e0f6c87d2335a9f2ca158ade11182ecbf7f6358edda4401bbe4174cb8f0f1a0711deae7586beba16e01652a824bb40aee159f83

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    155KB

    MD5

    1ae40f4958439fb54229a52837c7cca8

    SHA1

    087e504aaf507cfae0e727a2706ea205851ac4d1

    SHA256

    50a303ef01808907d5fe5bdfb7f606f3028b15efd139ef1f9a3afc977962078a

    SHA512

    03d7af012e355fc8cc69104ad13f09641447035a651732988facb21e0f31b088c4bcc27e1f970b43fab34c4640c78d767b7ff8838ce13b42d2cffd21ad4eeacf

  • memory/4716-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4716-784-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB