Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/08/2024, 22:38

General

  • Target

    40fed519c1a8f266a3b247ac0a4bd77b75e7dc3571e7337a21825962b2976ceb.exe

  • Size

    41KB

  • MD5

    de1d6540340d73ca3dd2cdf5c5da87bd

  • SHA1

    072dee09e547d761f4212ac615dc6c847e79926b

  • SHA256

    40fed519c1a8f266a3b247ac0a4bd77b75e7dc3571e7337a21825962b2976ceb

  • SHA512

    7a6ef530e1d2d335e887ea0c1e8baab4c933c78a69de58ba1f7508a1ebd9168f70a58bc7791628083581edf7f73d8d49d065ad4539207e4d6e222a2ab266846d

  • SSDEEP

    384:GBt7Br5xjL9AgA71Fbhv7bhvo42L5FgAytBpR42L5FgAytBpy6Hc6HzK:W7BlpppARFbhjbhg42LcfpR42LcfpybH

Score
9/10

Malware Config

Signatures

  • Renames multiple (3840) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40fed519c1a8f266a3b247ac0a4bd77b75e7dc3571e7337a21825962b2976ceb.exe
    "C:\Users\Admin\AppData\Local\Temp\40fed519c1a8f266a3b247ac0a4bd77b75e7dc3571e7337a21825962b2976ceb.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    611297a6a5ed3bf2737706256b478b26

    SHA1

    202e03e523668f843d6c27aa29e7b36ffb307135

    SHA256

    70f0ae665a3a1a8f300c1a53e6028d2e3f0c2e85aca509252a8546b4b80b1f89

    SHA512

    0bf99c430f433f20ff335be94ad041c058318ce82bf2f73ac851e43c7437b8248b223e42042315c6f14068aa876c8c888dcca51c2254324cf49b759a2fc61857

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    b85466f8148206cae6aaf8c7b24af3c1

    SHA1

    8e85a53b5c2ff1888c0978e90dcb9c2d05758e19

    SHA256

    2885a1ec3e86e235863a65e4895aee8d8dc3938caab7ae72e80a166350bb70e6

    SHA512

    af1453463b5fc1352a1a2101ab5eb641e7158072fc6fbe5a737b5734df80b1e6c9d6c3cadda868a21839d23a7954d8d16c9359e0674b133f2c43f76939fe9d62