Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 19:20

General

  • Target

    46e1ec899f5a0282b1a89306dda15210N.exe

  • Size

    46KB

  • MD5

    46e1ec899f5a0282b1a89306dda15210

  • SHA1

    2c6ed268b5eb7c88c5f4d944c195cf755e10e9c1

  • SHA256

    988a2c88ad1c5bd07dab66562857772d874b9feca9631efe46c0ba7b1b12876b

  • SHA512

    02abb62c563b7de0753c09d34872e1019eac7b3b8313c8b09066586ea0422f06ae90fea7979855d055bfdf801c91876281f006f0ea00c4cf8b2ff32428d1d432

  • SSDEEP

    768:/7BlpQpARFbhn54fmiy+3BVr54fmiy+3BV6nz:/7ZQpApmi6nz

Score
9/10

Malware Config

Signatures

  • Renames multiple (2173) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\46e1ec899f5a0282b1a89306dda15210N.exe
    "C:\Users\Admin\AppData\Local\Temp\46e1ec899f5a0282b1a89306dda15210N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    79ee2fa5ac1190f150598325243311aa

    SHA1

    380e3c1f83cae8d7384b56a381f66d59fd38fdc7

    SHA256

    37541294e58c9b49fd34748fb0e4909bf0e715b5b5095f4f6617644908b3c24b

    SHA512

    33c2b220ed0dd69a831d799cec1edfeb484aa8d2500a01595b8c227711177e96a2a8498d135e2af83fe899e713fac9cbccd7af5c31b6e261ef0e2c4c2d0c0bd6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    db947095749a98e0e8a0238fbd346a3f

    SHA1

    8c8542da8a31feeb58c52b4567aaf8739c45c10a

    SHA256

    d8e31615418db8b9587b58d825b618f281b8e2bdbe0b0dcf8d81fd0503ddf18b

    SHA512

    0db59ce21d0b88374a5cd9fed2793d48343aa22f10821d6b5288881ee71d46cd4a9c83eb2cc0e5029a22ed65ec8949006f6a1fa608df67a3812863e8140bf770

  • memory/1908-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1908-126-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB