Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 12:09

General

  • Target

    0782ca9cd4f0c64bb76c603c9db10ed0N.exe

  • Size

    45KB

  • MD5

    0782ca9cd4f0c64bb76c603c9db10ed0

  • SHA1

    80387ee939e23cd7e121b884651833077ced6c9f

  • SHA256

    a455e30fac4b7c035b5c8573e6790b8aa52373bf3dd9dd8bbf8ad080ba6f6735

  • SHA512

    5a509548339d5995e21ce6a440f6d61bd2cc699e1a4942b385aef1e1a3c95e57863e2b1ff7b335740a87e65f93e01b3e9a7849e1c0e268d33485ef4f3fe4a6a4

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvlcLclzwzKR5hrM1z4R5hrM1zs:/7BlpQpARFbh6g1IKR5hrxR5hrd

Score
9/10

Malware Config

Signatures

  • Renames multiple (2856) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0782ca9cd4f0c64bb76c603c9db10ed0N.exe
    "C:\Users\Admin\AppData\Local\Temp\0782ca9cd4f0c64bb76c603c9db10ed0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    7cd0d241bd6e5f7930b5b4926243bde3

    SHA1

    705611eff3ee5cb1dc94483276d4b64e8609653d

    SHA256

    fcf407c3b8b5846c87b335333e8b99e680cbcbc865116465c72c27751b43e897

    SHA512

    752531cde1d2d23a6085f3da2ce0bc59b8463091ab342a5b55e36be726bcc8def2b8f641643be09ee7dfc91c312fb7bd6b0a7854e31cd3b55123f23e20e86972

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    c0600d7af2427b19a0960dd1d483f49e

    SHA1

    a05af7dc1ab61abe5de72765982769937a3219f1

    SHA256

    18d91f23ddfbef5d4ca2eb713916f03528152e42276a57605000dab201dba917

    SHA512

    8227b5cffa14db2cb48139f89444d6cb2cb18c3177f35cbc9c855a9ea0e4a8fa149398c432a28d4eaa37e395b46a94ca30d4689e36c7b82992e506f35e6b0801

  • memory/2676-3-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB