Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2025, 06:49

General

  • Target

    0e9b493316189165e12f584c73028694d5aca867d6b2f4c1b1beb282c54b4729.exe

  • Size

    101KB

  • MD5

    7109034134dc5aa35e32e7882fc3b0e7

  • SHA1

    0192b966e18183a602d9d66ee34633cbfa27bf0f

  • SHA256

    0e9b493316189165e12f584c73028694d5aca867d6b2f4c1b1beb282c54b4729

  • SHA512

    6e857dbab5195e31df8bec693d1f7ca42137d6a0b08101f207bd0957c9d30502121d172a596f9fda28f0a3e672bb74d29936858483d67c04709fde01a4aab9a1

  • SSDEEP

    1536:a7ZyqaFAxTWbJJZENTBmRPsdj2hkAeCgI3i0CJS1Il+lM1hiC2CF:enay2tEyyj2yAeCgjJh

Malware Config

Signatures

  • Renames multiple (4351) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e9b493316189165e12f584c73028694d5aca867d6b2f4c1b1beb282c54b4729.exe
    "C:\Users\Admin\AppData\Local\Temp\0e9b493316189165e12f584c73028694d5aca867d6b2f4c1b1beb282c54b4729.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    817f6eec0dda217296e039e6b3c5d09f

    SHA1

    5ae7eec1a8ad39285ec089ff02ce9e7f7e61d9a5

    SHA256

    b27b167db09e172767bb962c38df3ad8f020cd34b0979d9f20da8937e9a09fa9

    SHA512

    1315dc6eb4bdb24fb84ae4ad674149bfea21c9405dd4260d72a9aa080cbb0ef67ff7b693b3cbbe556eb8297b3c6233ed9ef86ea26fb2b4371e53ecfa9418631a

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    200KB

    MD5

    b153f7efe5ff728822e80b5ec2a9031a

    SHA1

    575d539eeba650060b5e5c5940293d8af080a792

    SHA256

    a36f5c27f58c4a4e9de1fc3f961c4f9c356721c08f4f3055618c28767243581f

    SHA512

    213da5af21d0980153b67d452406621afbfdc1a588467329c18ba22ac4585f8b16fa0179dd670db9b88c86f0a1a8559c71b04bbc45c3332cc57a94eaf85e6a5e

  • memory/1288-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1288-662-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB