Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 02:58

General

  • Target

    c1647fa089f8dc36f3d10778314b9e762d14abad783118058ae4a7ba835dc2f1.exe

  • Size

    33KB

  • MD5

    cff9c4d2667034b46987f38be4858b41

  • SHA1

    901364035ef8bc25b7466b83d6f054d2800f6d62

  • SHA256

    c1647fa089f8dc36f3d10778314b9e762d14abad783118058ae4a7ba835dc2f1

  • SHA512

    dd605fab0180fb53e7db483d68a4d5fe74f1d9110f89aaf09c8a05b1573fe7cbc59cc7eb10d948bed4b63ef681bf96169dafbec9f6a9b0e4e8782f93bf71cb51

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHscLcNx4:yBs7Br5xjL8AgA71FbhvlcLcY

Score
9/10

Malware Config

Signatures

  • Renames multiple (3447) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1647fa089f8dc36f3d10778314b9e762d14abad783118058ae4a7ba835dc2f1.exe
    "C:\Users\Admin\AppData\Local\Temp\c1647fa089f8dc36f3d10778314b9e762d14abad783118058ae4a7ba835dc2f1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    7cf0601ea39b40b62e842c34f217daa8

    SHA1

    804c289dd3db876f9ba93e93f392b1c03092ba98

    SHA256

    5157a79667d3673dc0a0155154cc52e014eb5690a731359158778b9099939b87

    SHA512

    decee369eb1968d8de2888f8d22e8d3923d81afa241665a0883e755ab9fd6dbe305a5df444f349d7a52555bf568d44b827ec01f20ffad23ce11fa4da92c97f1a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    42KB

    MD5

    2edd222cf4dc92bc71a47f548feff59f

    SHA1

    dfaa890fa3b641d04f7dd392e956d7d4cf140754

    SHA256

    325148c6ed8126df7c78a65778583af79b3ab716915219b9cdd3927381f6ecc6

    SHA512

    83fec0a80211b043a379647ffaec4b5c7b386b980e77bb8a85f5b0a93db85cde7f465ea44ea9c5db07a88572e034e2c8c35540f2ad8056dc4338e85f57410587

  • memory/1604-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1604-186-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB