Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2025, 21:36

General

  • Target

    169a76fb11ecdb944ddc495bb8cf80992d57c7a920ba932a337fdb302e95671e.exe

  • Size

    184KB

  • MD5

    58dfcd37869ab90e69bbd8c5344549d3

  • SHA1

    d2f7b261313f2af56bc76d21ca347eb7755f8ac4

  • SHA256

    169a76fb11ecdb944ddc495bb8cf80992d57c7a920ba932a337fdb302e95671e

  • SHA512

    e4c0501c196ca52d7c0ebc78b2700ab0352069077b8ff8c1b2411b35d7cb6d2076f0a7e32c95697b8ce874143b0f15f6cc6e0d20546d9618205dec454eb9e50f

  • SSDEEP

    3072:htEyyj2yAeCgjJQWHIjN3tj6qnv0b2UrXkbvLiPW:fEyyj2yAIJbIjNDv0bNXkbvLiPW

Malware Config

Signatures

  • Renames multiple (4071) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\169a76fb11ecdb944ddc495bb8cf80992d57c7a920ba932a337fdb302e95671e.exe
    "C:\Users\Admin\AppData\Local\Temp\169a76fb11ecdb944ddc495bb8cf80992d57c7a920ba932a337fdb302e95671e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3756129449-3121373848-4276368241-1000\desktop.ini.tmp

    Filesize

    185KB

    MD5

    227bf9533c258abea7291f04603e6eec

    SHA1

    fa4eb6832988b5f6a1d0bfac4ea3d223c5dfddc7

    SHA256

    6e5b2c974845f8024c15fee2dc6aadc018a9fc3e206ef422a42a7fe5ec805877

    SHA512

    47f176a8709dfaafc0fd68b3e3f8be10ae6e60e73cdf6a015464fcbec156f556a576f574b0886b2f9c6ec334db4b8cad9b90c26f74079c68ea41954ed8f1cc52

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    283KB

    MD5

    99d0ed26be24aa675a78a54773c2794b

    SHA1

    b6af9b62ab189240e51d968e5e8b3b45e7c24299

    SHA256

    f8554bb6630bac17bb7b9c3b683ad0741c0eb04c5bf5014c4d866fb537f64efb

    SHA512

    4e8f28319f64fd1bee012bc7b9891156c71e0461b46435719808da87569bbb17b81ef2b3d1fd733a54ff7742bcbf8573e05b1a1704db06b6e0f9eae2c187a719

  • memory/512-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/512-653-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB