Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2024, 03:50

General

  • Target

    529eeb6ca1e0108042d929d1fd8c918a7d47cd4ec0859714f28c83735a5a2f3cN.exe

  • Size

    52KB

  • MD5

    0da3d6f5d92227dcdf9335b86841d100

  • SHA1

    e92bcacf5a22d833ee3fdb77e739224842be608e

  • SHA256

    529eeb6ca1e0108042d929d1fd8c918a7d47cd4ec0859714f28c83735a5a2f3c

  • SHA512

    d5c2ef955f8fe33d844569d56014f396f4a2b719ca44d9ecb177a05c3aff6dcef8942d1c5f632efb1e43780972dab891907c3753dfb4fd23d575815ee3276e76

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9U:V7Zf/FAxTWoJJ7TG

Malware Config

Signatures

  • Renames multiple (3231) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\529eeb6ca1e0108042d929d1fd8c918a7d47cd4ec0859714f28c83735a5a2f3cN.exe
    "C:\Users\Admin\AppData\Local\Temp\529eeb6ca1e0108042d929d1fd8c918a7d47cd4ec0859714f28c83735a5a2f3cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    3914ecca28a91110b73b7a20e5bbabe6

    SHA1

    958d335d71c35adb520c8aa34fa26be2990f6d11

    SHA256

    df9fa41d9a593fd2d30e659ca1bce2dbd3ba0013e7f5dba78a312e00d060545a

    SHA512

    10915689c268f21db8a714d6a9e739583b4d7d2bb887ac6415d98f3b3c1981e514d15278703a4e6faa02f5b6f4590730325075df2dafa7435baf70f4c15c8d2e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    6642d55dd604d16f3da0e3cd4f80dae6

    SHA1

    5ab7a600572e4a6bdf5048bf78e1edaa2f789045

    SHA256

    49af2c9eb5e3d492e5c2bd2825a603b0710055ea6ebdec91b0055833a5b6f861

    SHA512

    c5297e4df7827311b7b26241891051edeb7e8d87a7f75063ca378cb280bb9d65f2004d10899a0f97c307c1ccdc6e75e219e7f460380f8e023e6191e5bbfd2296

  • memory/2788-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2788-72-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB