Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2025, 06:49

General

  • Target

    0e9b493316189165e12f584c73028694d5aca867d6b2f4c1b1beb282c54b4729.exe

  • Size

    101KB

  • MD5

    7109034134dc5aa35e32e7882fc3b0e7

  • SHA1

    0192b966e18183a602d9d66ee34633cbfa27bf0f

  • SHA256

    0e9b493316189165e12f584c73028694d5aca867d6b2f4c1b1beb282c54b4729

  • SHA512

    6e857dbab5195e31df8bec693d1f7ca42137d6a0b08101f207bd0957c9d30502121d172a596f9fda28f0a3e672bb74d29936858483d67c04709fde01a4aab9a1

  • SSDEEP

    1536:a7ZyqaFAxTWbJJZENTBmRPsdj2hkAeCgI3i0CJS1Il+lM1hiC2CF:enay2tEyyj2yAeCgjJh

Malware Config

Signatures

  • Renames multiple (3147) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e9b493316189165e12f584c73028694d5aca867d6b2f4c1b1beb282c54b4729.exe
    "C:\Users\Admin\AppData\Local\Temp\0e9b493316189165e12f584c73028694d5aca867d6b2f4c1b1beb282c54b4729.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    75d9546ab95c3e937ef6494b5dadfa29

    SHA1

    632e123b7567dc3836e99f9db15eedcbbec84761

    SHA256

    e3d8442c5f05b26735136b0cbd01bd3d369bc29dc6c542d1a68d90a1b99bfd31

    SHA512

    7e5759842db6a0f1888c0884f934172405e75282481c22b0f81284b1f084f6f281c9edb8804ca982a042e5489c7035eae7aba3fbded750ff50f452f54725deec

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    111KB

    MD5

    1bb65d003503ec6c1082bf014604849b

    SHA1

    f0186f09b05422c1e6ddeca3110d7cf018e1e3bd

    SHA256

    f87a2ffa2c8f82f076967550861172ae3ad8430c169fce7dfcc902dd5eea3fb8

    SHA512

    82951823b22fbae0d720769d6a569febacf20c713897b4d620a8c4aca985a9310d1072a6cd98525f26b272ba9eea06506e62f608aecdc41aa27d5b1009bb70c8

  • memory/2816-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2816-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB