Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 06:23

General

  • Target

    252274da645081c24f8b77f35104f791c291dd1006ad8266dcf3ed8ed84bb3b7N.exe

  • Size

    131KB

  • MD5

    abe8118f9e0d91e2c082433f7dd777c0

  • SHA1

    da122f0391c1af3526ac472edf0bd867b59e0d0b

  • SHA256

    252274da645081c24f8b77f35104f791c291dd1006ad8266dcf3ed8ed84bb3b7

  • SHA512

    58fcbd430093fa87710a7672cb90b6ab93a8e3976aad0e2d907daa432d5c951586cbe90b2654ae71dd0f771065b2da29c493c73d063dbe8e914f6327275a0b31

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiJFEFuodN:V7Zf/FAxTWoJJ7TTQoQPyPhehU

Malware Config

Signatures

  • Renames multiple (2836) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\252274da645081c24f8b77f35104f791c291dd1006ad8266dcf3ed8ed84bb3b7N.exe
    "C:\Users\Admin\AppData\Local\Temp\252274da645081c24f8b77f35104f791c291dd1006ad8266dcf3ed8ed84bb3b7N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    131KB

    MD5

    b2e37714ae03db6a36d65941d1fd336f

    SHA1

    a895420f4850e4686b5963471a60d54be3d6b385

    SHA256

    d7983a7a19e6d6f01acf6a83774fcf9e87c03cf9f863574a5af1d42f3f5090a2

    SHA512

    eb9b148643d29da2b92c1fbf1f19221acd95b7a6849239e096ce19133c06b85a5d891630f8b26b3da0052fda34f1c25a79dc014572d9e0c91deac01da110a28f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    140KB

    MD5

    0dbc5641e7c17448a852ef5adef19451

    SHA1

    4d851ce051dd59d58c5e52a5d915c92ba14ef26a

    SHA256

    102eb7a557bc46e7eafa3ab367fd9c5f3e17eed7a6262fd1d37d895da9173a91

    SHA512

    427d03971174a2b2a7d6f8c97e9b1d200118e2c50db563d432356a4eaa0b88108879f1a7c35865427f7af327d2a31b419bd37cfc9cfebc538cd8d24b59a0198e

  • memory/1704-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1704-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB