Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 21:16

General

  • Target

    40eb8ad3e97e21254e2e40fc5df192cb914cfb8201c2db7258990f059576099c.exe

  • Size

    52KB

  • MD5

    904e7158cdca64bcda05581b6834d7a6

  • SHA1

    28df74f5974074479195d5125e30b0252ac3205b

  • SHA256

    40eb8ad3e97e21254e2e40fc5df192cb914cfb8201c2db7258990f059576099c

  • SHA512

    d49bce4bef69e07bb0a06dcd865c332aab77a32cbd843f4d7e6a7a9bcabb5590747365895351f102ca9038dc1fdf38567f85dd0d61d1e12aa18b53eae45d3c84

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9eE5:V7Zf/FAxTWoJJ7TUK

Malware Config

Signatures

  • Renames multiple (3734) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40eb8ad3e97e21254e2e40fc5df192cb914cfb8201c2db7258990f059576099c.exe
    "C:\Users\Admin\AppData\Local\Temp\40eb8ad3e97e21254e2e40fc5df192cb914cfb8201c2db7258990f059576099c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    458d4a70200ed15ab5d89b748814d9bc

    SHA1

    0d032e1f66bc336c4cdbd11862d657cc4a56980c

    SHA256

    eaf14ceba8d017fa1be7b9653710209c54743c72e3c47282a322d262b0c0b79e

    SHA512

    b1ccd45ffa5c92ecc07d9e14725d63b0ae69ec79c1e930c608924bb2145860de29fb10213c1520e68914a6e4b2f6bab00072dcc9a3873aad7f02f918b0df318f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    9febda59ae14b5a047c3529d2f98135b

    SHA1

    4650aeade94c120c0fa63df0d62f34bce0cb73f4

    SHA256

    a74b47eedf9acb213339413f6bff883e2ff2053826cf3eee5bf0499bccbb4ad3

    SHA512

    4dec1d138272674baf26c59f54bdb1d1144ffaff374d862c75be7a70de3d22a7ee1d2967b3571a65d021653025def84c9c549bf05945da85e5dc9cfe024632d4

  • memory/2336-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2336-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB