Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 01:38

General

  • Target

    a4d19fac7137ee3597c2b6a1ffc236bd9a14ce10319f8b26f76ecacfebc8885e.exe

  • Size

    36KB

  • MD5

    57fdde5319c37ba788afc48bc826660d

  • SHA1

    cb63cbef3a67955e20e8fe3fe5c45b02bf53b0e9

  • SHA256

    a4d19fac7137ee3597c2b6a1ffc236bd9a14ce10319f8b26f76ecacfebc8885e

  • SHA512

    76deab6f7232cd59221840a88280772b30f2732a7d11874cbfcc31689e0e4cc0c8a7fe0a757eb6822344df86ebe99b44281f6a530edf9d227548a11897c5689e

  • SSDEEP

    768:W7BlpppARFbhjbhQYjYY4F2j3TK54F2j3TK/:W7ZppApB1W5W/

Score
9/10

Malware Config

Signatures

  • Renames multiple (3687) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4d19fac7137ee3597c2b6a1ffc236bd9a14ce10319f8b26f76ecacfebc8885e.exe
    "C:\Users\Admin\AppData\Local\Temp\a4d19fac7137ee3597c2b6a1ffc236bd9a14ce10319f8b26f76ecacfebc8885e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    644272cadaf80a7345cb80e9f8de1816

    SHA1

    55e378d49b93e525fc441f1748148f154b92587a

    SHA256

    631c69de2875ef330f5d4ce0c6751f20b03602a333f159eb9400a5ded0fe8bf2

    SHA512

    387570e7932a97364bbab273b41c2ea50ce39f7719bc4ed86d356952094d417f300fbbdc2c676dc1435235e3f043da2ccb95d9824aeea32b204f4d84ff6b76b2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    4450e043e6a505460919e416887b6d50

    SHA1

    84ad79faaa36f6d7f125ae2ea6e1dc05138bad5a

    SHA256

    75c0b104b9580acf00192052c0a02ce271a41d86224a40ab9a70489e824439b5

    SHA512

    fe88148eca7c93b35364edafb12084427ee49cfe1d2c818664eb8fd7e187d5502dea91fd7f447df26bed118805fa380da95c37631f5a02057fcffab90ebfc4d7