Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 23:26

General

  • Target

    69d997f9c7678bedd667f1c18f863c70N.exe

  • Size

    37KB

  • MD5

    69d997f9c7678bedd667f1c18f863c70

  • SHA1

    8c12876c5dd47858d3ab79aec01695c06eedc5d8

  • SHA256

    7f614813bce7591ee7c1e112562071ba767afcf86a4629d564d0bd1daa70ff00

  • SHA512

    77df8085564b453fec8ad1e7c89fc8dfe4b3f0a3a7ab80c148cd47769d61c92da0a87079bb4b4169dd9b895209b2c1834e91c8f6ae3ac6dc362bbda9a7516c5f

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHA9jxjZ1GM2kS0Ie1GZ:yBs7Br5xjL8AgA71Fbhv/F40U0D6

Score
9/10

Malware Config

Signatures

  • Renames multiple (2731) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\69d997f9c7678bedd667f1c18f863c70N.exe
    "C:\Users\Admin\AppData\Local\Temp\69d997f9c7678bedd667f1c18f863c70N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    cb62c27fd010cad4d82a9d1b8208e76f

    SHA1

    bd6eb72dbf5d70456b685ca87400876b374ccbea

    SHA256

    1f2c3e80b1fd580618008463814019dcc19ff6043366da74c94c6a1b837094a8

    SHA512

    09c454178b7e5fd4576579c241ab11cca087946f8bffc08b219a46e47c487ba3bff81ffe7e39fe0aa54d0067b21bbd330ba4347a6875f3f2a0c3aff3c55573f2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    46KB

    MD5

    001d11ac5924d80d92f3f2d6304f3baf

    SHA1

    4bb4426bde044318d4b98c1c4cef9e978d180dff

    SHA256

    0b6ad94808e294a91b9ff6de0ec139966ec30feb9f04866f789c7514e87cb8cc

    SHA512

    9d085cc205a2944b9e859d69218278ab589c13e7d6b136ebbfec75af6068fc05e8aa67b6c97402e8c8cee53c87e9e890db0b6a42fba006ad762dfe1216b7ec0b

  • memory/1940-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1940-160-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB