Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2025, 22:04

General

  • Target

    80132bc08887deeb2dc138241236d8e327e8c904b61f87013bbcae19b66a0fadN.exe

  • Size

    386KB

  • MD5

    1ffb52b63f07303ebc22658e046f4ad0

  • SHA1

    c94a762051b089d87314c5ada5bf6717c6504dee

  • SHA256

    80132bc08887deeb2dc138241236d8e327e8c904b61f87013bbcae19b66a0fad

  • SHA512

    a9fe5fb486712f5d5b09974b919ac68dd6f7998b5964f75ea1379a80ba7ecc25f3db98965756da0fca75fc97d74108d1149826c1efc9d5685ac10c05cc60714f

  • SSDEEP

    6144:KbEyyj2yAIJbIjNDv0bNXkbvLiPpEyyj2yAIJbIjNDv0bNXkbvLiPx:WyAUbIZGNXkbvLcyAUbIZGNXkbvLO

Malware Config

Signatures

  • Renames multiple (2434) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\80132bc08887deeb2dc138241236d8e327e8c904b61f87013bbcae19b66a0fadN.exe
    "C:\Users\Admin\AppData\Local\Temp\80132bc08887deeb2dc138241236d8e327e8c904b61f87013bbcae19b66a0fadN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini.tmp

    Filesize

    386KB

    MD5

    bd4f2a4da1efb6ca24fc6ec31ec5debd

    SHA1

    48455cd3f128cc80807a893fdc5bdbe504329f9f

    SHA256

    623bfe36b3a518fded0edf11724ee9e5b9cf2301475dba35d05403695dbaa23d

    SHA512

    572d928ba070cab9b72962826a70f49eced202687f61d0aed74c4fb20e44693f8643739a7e328a0d6102553619e8441b64e87d664cb6c40306a64344bbfe1330

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    485KB

    MD5

    3968929e1426acb58c8bcfdd8050b9c8

    SHA1

    51b33cdc3eec651834e74b94c46ff747274d19c9

    SHA256

    9256f9e54a8b5a39f4b3114cdc8802729c90eb37a17936b5939a6c222562d9f4

    SHA512

    47bd72975018215f875a311344404287cdfbfcb98eca9e3ac7ac5bc8f7d885eba645b9a2628d7d6b7c5e23c4b306564d5a1c315d2d07c536e0657f0daab56824

  • memory/3024-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3024-478-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB