Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 20:34

General

  • Target

    345c7f69431e499ac2c8480f4db1205062f707cb311cf50411b6a71c47487bc5.exe

  • Size

    42KB

  • MD5

    7ebfc337e1189d096c6640c744dfedc4

  • SHA1

    68699c53f6df6e16c28b4206045a910bf5a113f7

  • SHA256

    345c7f69431e499ac2c8480f4db1205062f707cb311cf50411b6a71c47487bc5

  • SHA512

    e349ff0fc18cf48ff3889f3f214b0045a71fca1c969b5714d9f8c8a6016633481dd825b9efe4d27b5eec575ffa3e55df22fa08cc2ee1fe44b6fbc280482ca54c

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9Ro+QOViJfo+QOViJqWNzOZzOr:CTW7JJ7TPUnWwMr

Malware Config

Signatures

  • Renames multiple (5186) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\345c7f69431e499ac2c8480f4db1205062f707cb311cf50411b6a71c47487bc5.exe
    "C:\Users\Admin\AppData\Local\Temp\345c7f69431e499ac2c8480f4db1205062f707cb311cf50411b6a71c47487bc5.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2437139445-1151884604-3026847218-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    4e3eff62c39d3e4475c8903810ddcdff

    SHA1

    ea1d7cf394efc37ef421936ddf110de84c74dfd1

    SHA256

    70687782550b17e1762dab95d6c59b6f2ab748dc87aaa0789057d1d7d4382c01

    SHA512

    e4a1b5857deb368c780c207a07b76eec9311dbfc429a93a42f0af2ec12318c257372b50ef87615872cae7b637977df9edb70dfda6bcaa902bc39c23fffbfd2e6

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    141KB

    MD5

    ab7b4d22d702b59faf5a4774fb4f744e

    SHA1

    00e21d638d9f5a2678fe569d518679a04323fb7a

    SHA256

    f00be650c7b4f12c62d1a48c06767ae4d8c5b23a831dc3c6de6ca27369333511

    SHA512

    adbb4a7c63d24fc700cdb0c0a81018759817ac9389cf9a9c549f2720bd5fc4d45bc110df1a6f362610f88bdd8d033d601d0010d6cccb6f8276596bb3a148c40f

  • memory/4948-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4948-767-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB