Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 03:14

General

  • Target

    6289cab9a0ad98f59040b8a8496596b0N.exe

  • Size

    101KB

  • MD5

    6289cab9a0ad98f59040b8a8496596b0

  • SHA1

    7c10720ae6fb223f03879d4e9d42580121e105d8

  • SHA256

    207e99e5429116e89af206741153aa8f4eede0cd7ad8586ab27b81c59de3e0e8

  • SHA512

    3f92c10e7b1da2d9582d1af8a710db65a6cd21aa379ca8f6185fe972b94da3fa01b0161777bc0fab0513347e8624087632218630f585094a35336642c782cad8

  • SSDEEP

    3072:9QWpze+eO888888888888888888888888888888888888888888888888888888U:Lpe+ekeP

Score
9/10

Malware Config

Signatures

  • Renames multiple (2844) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6289cab9a0ad98f59040b8a8496596b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\6289cab9a0ad98f59040b8a8496596b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    101KB

    MD5

    7ae8d58477ef6def1b5b838a5120bafa

    SHA1

    54e62dc35a41389db4119cf57f42bee7619b200f

    SHA256

    12274ae8ae7d32b96a05e3919fbcf4294b55bcf13896fabf61edcb4d08005ac4

    SHA512

    2a127fd1f3b14dec2fb3a02ed730c12c024264b7509233bc3f1cd43d50b33c9ca860f09d8ee56849963e07b6c97d7cd183210b881487c9c04c231cecc51d3c02

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    110KB

    MD5

    0182b1565aa3ec24ba0a549eec85b00e

    SHA1

    09061f9d5217c7ee0fd12aaae310d0c500ce3ac0

    SHA256

    f17779f9a7581363dbe12779c77fe2ddc595494b0e29a6be299d441879d06dbb

    SHA512

    03e460e2c6d0e75e975e8352e6cf1cdd5cbe84eddfb8fa3049cc5acd1193e4de8e9a1de3d96b930af7e6e685bc6057bb226eb4936b5c0c18a52293ff256eacbb

  • memory/1988-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB