Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2024, 04:02

General

  • Target

    ae55a1547a7a5c35866d23c30d11d703388783cab6d42e11912651cf948fada6N.exe

  • Size

    96KB

  • MD5

    8cac31afea290bd6a31bf7521b438660

  • SHA1

    d564facea5f4208dc01dbff02b4a16465d3c33ae

  • SHA256

    ae55a1547a7a5c35866d23c30d11d703388783cab6d42e11912651cf948fada6

  • SHA512

    380ffcddd2fe5eba4a5d1ef1c1a103e9b1410f3062d75f3e88cb17aad1bd9efefd8fcdc3be586d9edf208bda45d2e73617fabc8d447600545cab4e34a4fd770d

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBHfiPDTW7JJZENTBHfiPdFT:fny1tE/tEAFT

Malware Config

Signatures

  • Renames multiple (3166) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae55a1547a7a5c35866d23c30d11d703388783cab6d42e11912651cf948fada6N.exe
    "C:\Users\Admin\AppData\Local\Temp\ae55a1547a7a5c35866d23c30d11d703388783cab6d42e11912651cf948fada6N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    96KB

    MD5

    f25dcf41e809dffb7ec13d77b1c6e9cc

    SHA1

    51457e38bffc2561ac4b65fd04318c20c2aba133

    SHA256

    3c1677b99250aefd7f751261cf5444b12700914ad1ff65ecb8c8eed0e32c67ac

    SHA512

    d0b996c97d99fb0547dbbdee09c726c363b5ee2a507cd3e571f4ad2a5943d54c9642ff5924e2919f837bb77b06eaadf2e29b6ff57c444eba814f64b378891169

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    105KB

    MD5

    5fe95768da8dde9086794f5d9604357a

    SHA1

    a07c20db9cf45bb1860264d21d88957c65c6832f

    SHA256

    641168856786252913bf19413ac3a6162884364c172b51d9bfc8e8b4b8097655

    SHA512

    00e408b42667aaba7a6bcf6820fbc06918759e3b7c5b2255216e72fabebae142df8e3e322be67fafebc27dcfbf7459f782887118470d5bf98a0b144da35b4b13

  • memory/2188-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2188-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB