Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2025, 21:16

General

  • Target

    1d9d8d60d99d1140b173ec85db21119f315e5e8f41d734a62a607c0f5fb4dffb.exe

  • Size

    341KB

  • MD5

    bfba00ceab183b26b42fe6fead6b305e

  • SHA1

    64cea5ff1d9ca00d3f26ef7653223b8b8dd999ed

  • SHA256

    1d9d8d60d99d1140b173ec85db21119f315e5e8f41d734a62a607c0f5fb4dffb

  • SHA512

    179462e5e1f42c2f3541f2ff2284b99c8acc705edf9fc163134fc3304238de7ac5e54582b6ddb5b55ea248e91cb9f643b54c8a556ba48ff9ccdd00ba25c76ce3

  • SSDEEP

    3072:fny1tESQv+T3K7mvRIWXiqKkKGbTDVPuqny1tESQv+T3K7mvRIWXiqKkKGbTDVPu:KbESQvE6g9tTDVYbESQvE6g9tTDVW

Malware Config

Signatures

  • Renames multiple (3156) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d9d8d60d99d1140b173ec85db21119f315e5e8f41d734a62a607c0f5fb4dffb.exe
    "C:\Users\Admin\AppData\Local\Temp\1d9d8d60d99d1140b173ec85db21119f315e5e8f41d734a62a607c0f5fb4dffb.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2437139445-1151884604-3026847218-1000\desktop.ini.tmp

    Filesize

    341KB

    MD5

    2fb4db621f1559cc09d61141589e6eee

    SHA1

    49b881e6a8d929aebeff84ddd295d0ffeb3c8c56

    SHA256

    afaba5c9dccc95e7d6d6e016e79db72cacee50003b440430e2b49747469838e4

    SHA512

    77847e275e499bff213f13971784c62d2e84899e1c898ca6e973b33e1ad190e88bcf3c08d6a93d81be9da3bc3db989baf81c8b50b084f6125f6757b98fab0877

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    440KB

    MD5

    890269b6bbd78f99cd6e95d98a570cfd

    SHA1

    10557d78dd9acf8c5347ecbec74297d89a6153eb

    SHA256

    04dcf901320b43a966ac4e879af31f221b0d087837584259b7110f7c780a0d99

    SHA512

    0b742756797fbe2b1e7aca75fc958e0d87398500c9e36233f5ff3827aefd1debee4dd4341c3a9a94d768bcc65bd0b172528b50e0d65eac8c31312c4f8251175e

  • memory/3016-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3016-636-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB