Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2025, 21:16

General

  • Target

    1d9d8d60d99d1140b173ec85db21119f315e5e8f41d734a62a607c0f5fb4dffb.exe

  • Size

    341KB

  • MD5

    bfba00ceab183b26b42fe6fead6b305e

  • SHA1

    64cea5ff1d9ca00d3f26ef7653223b8b8dd999ed

  • SHA256

    1d9d8d60d99d1140b173ec85db21119f315e5e8f41d734a62a607c0f5fb4dffb

  • SHA512

    179462e5e1f42c2f3541f2ff2284b99c8acc705edf9fc163134fc3304238de7ac5e54582b6ddb5b55ea248e91cb9f643b54c8a556ba48ff9ccdd00ba25c76ce3

  • SSDEEP

    3072:fny1tESQv+T3K7mvRIWXiqKkKGbTDVPuqny1tESQv+T3K7mvRIWXiqKkKGbTDVPu:KbESQvE6g9tTDVYbESQvE6g9tTDVW

Malware Config

Signatures

  • Renames multiple (2077) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d9d8d60d99d1140b173ec85db21119f315e5e8f41d734a62a607c0f5fb4dffb.exe
    "C:\Users\Admin\AppData\Local\Temp\1d9d8d60d99d1140b173ec85db21119f315e5e8f41d734a62a607c0f5fb4dffb.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    341KB

    MD5

    dfbe3512f1482bc86f95973923aedf94

    SHA1

    04c5f5f04a56639f7ab53c25407092f94de4c3ca

    SHA256

    5b7809b0a5f3cc350bceba0141aca11cc14fadbb1090434d6815089868dc37df

    SHA512

    4e1d3b872d58f9091187329600eb0914b1ed7b9cc1f3028ef858cc5f419f0c3561078fe9d811613c74b0bf925ccdc5e0d3b6c2b34366ad048cdfb527f335ec31

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    350KB

    MD5

    15517859558cda41875a5c1a4e7876be

    SHA1

    022fa36d7134dc312ddf103bb6837d6aca75d17e

    SHA256

    b522bb4c7c6313a0c91d43bcf6fd01da528136799445b6de3bda39448900f0a1

    SHA512

    f563e85ae9820ab5074c894483d4aa02a2e6582ee49631d73ce231369b436bb58185ec227a90905219ee2636a4088bc17022cb5d796844229de5800e8e079ead

  • memory/2316-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2316-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB