Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2024, 22:32 UTC

General

  • Target

    67090fbcd4f1a911faff02ee876dcd8a0104d6570b74089e83bf68f92040a461.exe

  • Size

    60KB

  • MD5

    218dbada49f538509f66d708b1d87ed8

  • SHA1

    43e06ea7d5d9cf555bc8fd943120cec8b1542e92

  • SHA256

    67090fbcd4f1a911faff02ee876dcd8a0104d6570b74089e83bf68f92040a461

  • SHA512

    bebc4b775cafebf2a4231ccd2c40bfd4b9dc627178117dd200be6ee90063cfece1454167bf8a46c90b6eeccb4f33cb07a088e6e54bc36a0d6f5207a73b6bbad8

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3Po+c+O:V7Zf/FAxTWoJJZENTBHfiP6

Malware Config

Signatures

  • Renames multiple (3647) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\67090fbcd4f1a911faff02ee876dcd8a0104d6570b74089e83bf68f92040a461.exe
    "C:\Users\Admin\AppData\Local\Temp\67090fbcd4f1a911faff02ee876dcd8a0104d6570b74089e83bf68f92040a461.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    bf3469a679adb18244622fbb6984381c

    SHA1

    e2901c88e7986a9f5f00da787afd3b1e38db167e

    SHA256

    9f20da6557ba5ad11c63b25188e1552ffb99556379889f40d39e38479526b73f

    SHA512

    01eac302251d7c4a967a45dbc87c0967b8a50a79c01d1a202e7cce2cc972021ae7af6fff045f471ea691a897fd245bcc766ebfbdfc13b31bb779f725f4686e48

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    69KB

    MD5

    dfdb96649380f5a3d2f00be39f09131d

    SHA1

    cdf2841a3be35fc5c5bd63ff1b69b0276406efdc

    SHA256

    b4f818d7feaac08e6f7ee86fc75fce51f901e49b4c63a731e839768b820b2b6f

    SHA512

    a8dcde6201809b8e8c5208fe2db350ffc556399d3fb6be9d1e8e06e44dfefda3081c828a890f8ad266e4da73d6e46dfedcf0631c488ba29492ad333c68fa1a47

  • memory/1016-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1016-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.