Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    28/07/2024, 00:58

General

  • Target

    288285b693ab42881d95d71d04d5d9c0N.exe

  • Size

    46KB

  • MD5

    288285b693ab42881d95d71d04d5d9c0

  • SHA1

    695b07b5aaeda1a20e9bc1598b97a696d4cf851d

  • SHA256

    99ec45f9dc8e0aa478e909d02f21c297a99e950271006eed1ef2d69790e24f8b

  • SHA512

    4c7b741ebcccf9ac0c92c80ac979785e69c0b1a2195258a63cfa41090a187f181d918d3fbf6ff16a8e20856a46034abedc69ae205876a1d8f937a99716d155eb

  • SSDEEP

    384:GBt7Br5xjLvassAgA71FbhvgqHqMjL4jLS/3MMf/3MMy0U0exOewcrxOewcP:W7Blp2sspARFbh5YSfffyn7xJwexJwq

Score
9/10

Malware Config

Signatures

  • Renames multiple (2811) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\288285b693ab42881d95d71d04d5d9c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\288285b693ab42881d95d71d04d5d9c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    96d7f4562d0d294c7a6b2a4d7f23b950

    SHA1

    107f91ae022fe9a2cd3fa317b2dc160d0f405aba

    SHA256

    214cc832e2abdaf687256a294d468b1075c3e0ca32c35d68150edc482beb5110

    SHA512

    c7c12c6747faf02665145c4a6a9f1071efe07b9b19513df59714bfbb94cd8c4371b4e962685856672db502e19640dc1f17f67e0130bed3bfde0f367659824fc4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    2341a6565a9529be00aaf894388a4696

    SHA1

    801bac49f3ed018a0d10cc992ab51617acf09bae

    SHA256

    17ada256ef911312da941ec5f79d2a60811e19d2794926707ea7453e1b2e3a68

    SHA512

    a8ce00ec76cd5e5629671fca549ff93b7ea8fb65ca9f2983251bb8a55a337f38d403701fab9c6701a3919d0b9e296b9c83d5656b3c1aca187016b02e8657a92f