Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2024, 03:50

General

  • Target

    529eeb6ca1e0108042d929d1fd8c918a7d47cd4ec0859714f28c83735a5a2f3cN.exe

  • Size

    52KB

  • MD5

    0da3d6f5d92227dcdf9335b86841d100

  • SHA1

    e92bcacf5a22d833ee3fdb77e739224842be608e

  • SHA256

    529eeb6ca1e0108042d929d1fd8c918a7d47cd4ec0859714f28c83735a5a2f3c

  • SHA512

    d5c2ef955f8fe33d844569d56014f396f4a2b719ca44d9ecb177a05c3aff6dcef8942d1c5f632efb1e43780972dab891907c3753dfb4fd23d575815ee3276e76

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9U:V7Zf/FAxTWoJJ7TG

Malware Config

Signatures

  • Renames multiple (4643) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\529eeb6ca1e0108042d929d1fd8c918a7d47cd4ec0859714f28c83735a5a2f3cN.exe
    "C:\Users\Admin\AppData\Local\Temp\529eeb6ca1e0108042d929d1fd8c918a7d47cd4ec0859714f28c83735a5a2f3cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-493223053-2004649691-1575712786-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    5836ae7b0c70f305f9ac913a80e6ebcf

    SHA1

    766e573f11791a785b047dc55bc9002177bbd636

    SHA256

    847616508be4c08fd3de12de7e95e8dec2e9924caaf410e6c997bcbbf8b58726

    SHA512

    f8bf1252395a77b90e0a1b8e194fb799046455ab3a798cdd9e751467c1dde70b024a606d0bc7f927e7dc7e30028e13b9112805ed46a6b4ad963534767f09f831

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    152KB

    MD5

    1590df71060c947b0646b0d87c194df7

    SHA1

    2ba073fbe68f4e3928535bb427d406d72cc29e31

    SHA256

    d5f85567693c0a9fa6aaf49f3c9971a2bbecb7a09570c35289eb19e72dbdcb16

    SHA512

    95f763b13fd7bb28e3fae9bb8d42ea1a73da2eed8e621e5a19b3f28cd9cf89fe9f1bed291ee29d3628be20af17e98ce89325bdb51eb33d9f96a57998522541f8

  • memory/548-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/548-786-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB