Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2025, 06:55

General

  • Target

    df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe

  • Size

    1.7MB

  • MD5

    9bce9dae679419198574f4c9837085db

  • SHA1

    62a24f1ee057e936f3bf01749ecd7e3675d0f10d

  • SHA256

    df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8

  • SHA512

    9647610d36379a789ab45e21b1997eeff560058cf55374b0a404be9474becca566ec0dd97cbb49b8d54da811bb5fe1e4d2e3e6de9b8fd57825181d611019f467

  • SSDEEP

    24576:6G5C8hr/Vz9ih9i38xVEL/QQPL6BH8kQqNgQ+uH6FqgtMok4+iL:I8hJz8eDsH8kQqNs86F1yU

Malware Config

Signatures

  • Detects Trigona ransomware 14 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Trigona family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 14 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe
    "C:\Users\Admin\AppData\Local\Temp\df9ef29e8789a798981a783fafbb85395a84e8733929b2c2290bcde263c2f3f8.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini

    Filesize

    2KB

    MD5

    d7aac63c64b8e5a7f83680b717356ce8

    SHA1

    89f27ec736e3cf55d1b86729337de28e00036a22

    SHA256

    bbfd6b721e47fb713ec04169a96587b69cf9c7082210d9864db31f0b53b1004f

    SHA512

    01f4e884ab67239934ffc2d855f7281853fc570f41a6f141635c045786f3d35d46df6ce3fedf7ea4e23f96d80c890cc6442196437c92f6b7784922d8539cf6f2

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\how_to_decrypt.hta

    Filesize

    12KB

    MD5

    4812fbb63ae6f8146f55452ccd689920

    SHA1

    16f39806bc726ec8d0fc68d6f872e42047c2b952

    SHA256

    007be8e698a108c0c6acdf96a15a8e73949d0fb39f1596ac5fb9a3e48dc38541

    SHA512

    7ea7a409191be4bbe1dc8fc1e16449cea9b1b8a34d25d2b21a925cf2035ba7524f299bff7489f40469456f36c4b3966e2bb4beae71120cfef97872a49f81041e

  • memory/2868-2249-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-1-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-6-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-10-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-2-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-1757-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-0-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-4-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-2880-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-5809-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-13112-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-13113-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-13114-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2868-15197-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB