Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/05/2024, 16:59

General

  • Target

    b7612665a1e20d4c0fb4564413f87363.exe

  • Size

    126KB

  • MD5

    b7612665a1e20d4c0fb4564413f87363

  • SHA1

    adc61816e8268c1ed73b91c032214cc706564971

  • SHA256

    8e93f6ae1cc0427a52acf313f96c422f6889419ffc60a179929ced1d65ae3194

  • SHA512

    ee04d19d2e71b1490ea2ecdda84e00960908f7545cc46d843eb665cc7cdc8b596f322d109d06cfb3d3d31c658612ca3fdfef81b9ccbbcd10e8fb4ee958c71910

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXB85c5VnD5:/7ZQpApUsKiX26B

Score
9/10

Malware Config

Signatures

  • Renames multiple (4925) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7612665a1e20d4c0fb4564413f87363.exe
    "C:\Users\Admin\AppData\Local\Temp\b7612665a1e20d4c0fb4564413f87363.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1720

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini.tmp

    Filesize

    126KB

    MD5

    1e56d97f289efde131ab5a2468a104ca

    SHA1

    437be9bbcef595ea2d521bb3c6e4d40e8f2fa927

    SHA256

    46d3a7cc128b1df4bd33defbcc83ba9b5110680339fc2b4383808c1198aef78d

    SHA512

    7dc0b0ad1bbbddede0338a1cb4f30d886ef61b5770e3c2c3a7c719a8ce1bffd4a370aa3fd24f9b681c37a98286269eb88f51ef2b03759f3aa8270c864736f517

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    225KB

    MD5

    5a213afb5f6d176ca9c1b51885882d01

    SHA1

    5514b63e42c1def9b8ef244c5a52c0d7acac42d8

    SHA256

    17a6c1cb8aad51e5af2e92c9d06da876c60b8a3174bb2c319243af8f269436db

    SHA512

    bf310f5fb075dcb0ee15a61a63a2adfb9af64ad19b0d924d8c7d3da07945e0406e180572e06803e8084c2540a9dda3e0008c7db0f788988cfe591542dc7477e9

  • memory/1720-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB