Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    86s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/03/2025, 14:56 UTC

General

  • Target

    Chrome32.exe

  • Size

    126KB

  • MD5

    e0d108435c58dc9403588e4dcab68275

  • SHA1

    7a7331423938020550ff3decd2e8b50b3ee5c87a

  • SHA256

    61cd0131cb4bf090c5ee7761566f6f7a778e78b37d220f0506f98632a2663ee8

  • SHA512

    2a5648ced91b75d928b4d71a8580c5bee75a5f27623f8c5071cd23b8cd85eaa8129ddb0aaf0a1fcca05fb1b7868a0fcd9306e9ddf2d3eaaf605c41cc7fde4a9e

  • SSDEEP

    3072:7+gYdgLNp0jPilel4+800N1lknzRxqmhda40U6hrnzRxqmhda40U6hK:6gvunnhdaLlrnnhdaLl

Malware Config

Signatures

  • Jigsaw Ransomware

    Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

  • Jigsaw family
  • Renames multiple (2014) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Chrome32.exe
    "C:\Users\Admin\AppData\Local\Temp\Chrome32.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Users\Admin\AppData\Local\Google (x86)\Chrome32.exe
      "C:\Users\Admin\AppData\Local\Google (x86)\Chrome32.exe" C:\Users\Admin\AppData\Local\Temp\Chrome32.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif.cat

    Filesize

    160B

    MD5

    a8258060e35cd08265a3f658e6aa2963

    SHA1

    a67c6aeb6db7a488c84810feea22a2d6f7be9bc8

    SHA256

    e847f277e6adf5f94573c0f1b10ac15efd6ca48f34f9be52e9baec6e1f1de04b

    SHA512

    70ecf38aa25d92ffff7a24ea35c467c95b9a22dfdc99e0705d56527923cda574add21987ab98ae2b8c589e334141d6957a660a3e34a546c764c3e42069f50d45

  • C:\Users\Admin\AppData\Local\Google (x86)\Chrome32.exe

    Filesize

    126KB

    MD5

    e0d108435c58dc9403588e4dcab68275

    SHA1

    7a7331423938020550ff3decd2e8b50b3ee5c87a

    SHA256

    61cd0131cb4bf090c5ee7761566f6f7a778e78b37d220f0506f98632a2663ee8

    SHA512

    2a5648ced91b75d928b4d71a8580c5bee75a5f27623f8c5071cd23b8cd85eaa8129ddb0aaf0a1fcca05fb1b7868a0fcd9306e9ddf2d3eaaf605c41cc7fde4a9e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DNTException\container.dat.cat

    Filesize

    16B

    MD5

    a2ec71f236b0da26c756b086bd502f09

    SHA1

    e9dc21e143a2aba3ca9eb634ed291ddf93b32e4b

    SHA256

    b4805a7f3e187212efacd5c2475bc8a30ce7274f8dae65858537a7f08b866717

    SHA512

    a1d0f50c760c9bc3ab50053633e2fd3bdca6d0de8f256b48b5c45c8bc20a93a7e2123b09c8ce5de3c9ef013d0f2c3de165d68f7748c89d629122ae6d498e9af3

  • C:\Users\Admin\AppData\Roaming\System32Work\EncryptedFileList.txt

    Filesize

    189KB

    MD5

    59458cd88f32e76ba5eb0ea8f34a5cba

    SHA1

    e5ad4e1ef81ad7f8e8802a8179fa9fef7a78c562

    SHA256

    867e61cb1191fb4a7b76368d098b1e13ddeeba9e2e2524d572b948b4bda858d7

    SHA512

    79064ee674ccc7b6c5a5e9ddee30eefeb15a48a393b687079d9edc7cffdb4eb2c7f725fae24592d3b72d3a4e8b6ea5f829791ea56db2e3ba83121f66a251a806

  • memory/2404-2039-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2404-11-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2404-9-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2404-12-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2404-2034-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2404-2038-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2404-2053-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2404-2145-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2404-2146-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2524-10-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2524-5-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2524-0-0x000007FEF536E000-0x000007FEF536F000-memory.dmp

    Filesize

    4KB

  • memory/2524-4-0x000007FEF50B0000-0x000007FEF5A4D000-memory.dmp

    Filesize

    9.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.