Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 07:39

General

  • Target

    9c263bc5a5ad095f3760cff9dc6ec8b3fc46c6a7c74d4f564d29ddfd81ddf077N.exe

  • Size

    86KB

  • MD5

    ca893b01ec1f2b0c7a872b098ef17eb0

  • SHA1

    cb8137ba8c8452850ef8d076037e9d01ad831aa6

  • SHA256

    9c263bc5a5ad095f3760cff9dc6ec8b3fc46c6a7c74d4f564d29ddfd81ddf077

  • SHA512

    685ac9da122247ec2fd58b961a35c811c8204e98d799bc9f38bea0b641361f53b81781fc43d80e97d8e94b7d51468daa7ac2902cc23750338f4b7c76d9347998

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5Kwo:fnyiQSox5Kwo

Malware Config

Signatures

  • Renames multiple (3142) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c263bc5a5ad095f3760cff9dc6ec8b3fc46c6a7c74d4f564d29ddfd81ddf077N.exe
    "C:\Users\Admin\AppData\Local\Temp\9c263bc5a5ad095f3760cff9dc6ec8b3fc46c6a7c74d4f564d29ddfd81ddf077N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    86KB

    MD5

    a193b6f9679536ed55e94ae8c8b69bf8

    SHA1

    4dbc7a620df365cb0a9c10cf1bbf8f4ab04ecfc5

    SHA256

    2d9b00c4feaf3b58502ebe4599fbaf1448925bdb15f9c2619e1e0361fde97c72

    SHA512

    c93e8ae6e5a85502a81656b5c1d7036ea96c5ebc7b9317bad6432d0c9380577958332040bc1ceb569cf27ca95ee9881ad02114dd6899864a54bb23c220c7bb23

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    95KB

    MD5

    7649701e0bad668b4c88f00d5ba3fee0

    SHA1

    70c1a6b67ab10f24d8dc27c7c3572af3e0d9b2ab

    SHA256

    bb78e42d60df448f78c1117207120667a045890240e7ef5a1224312e8ca207b6

    SHA512

    de8f49646b2c7080e84378e178a05399d6b76ed2c8b63fe4ef96031a2255a3113626843c6f0bb263641ce470f602d91249fe03c48abf566746d44578a105c0ec

  • memory/2660-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2660-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB