Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 21:47

General

  • Target

    08e9dd8c73ce5b2a1195197d2df5d240N.exe

  • Size

    100KB

  • MD5

    08e9dd8c73ce5b2a1195197d2df5d240

  • SHA1

    ae59c90ba82de1ee027051fd39bcb9cd4fdf0586

  • SHA256

    9ad57c5be5c7c718ad16c3f389ab2ad2394246733563862eaf3e281934530fc9

  • SHA512

    f28f7acca296084fae6164cc839131394be7e835636c0ba183fc680fb5c41a00ebb39725b52ad8b4b2052f17e33a4ea3524c93ed3590ab66a11bbcecf593c9da

  • SSDEEP

    1536:W7ZDpApYbWjIlE77ufL2e+efZwZQ/8S/8z3ML3+5:6DWpwE7oL2e+efZwZ08i8z3MLW

Score
9/10

Malware Config

Signatures

  • Renames multiple (316) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\08e9dd8c73ce5b2a1195197d2df5d240N.exe
    "C:\Users\Admin\AppData\Local\Temp\08e9dd8c73ce5b2a1195197d2df5d240N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    100KB

    MD5

    073f4e59080f02206a902e8248cd8fac

    SHA1

    af65673b3064f293ea467fefce12905a46366cfa

    SHA256

    e1cc1243255c05ec773759449a1d5f240b9becd7a9d21cc4a844d90620b97303

    SHA512

    36c5278326bb491fc1412ed72baf94b82956a7b192b88c826e75674bfba959bc6c555926140208b0b92d956c173c004caa6eedb3f318702226db19a85a7935a1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    109KB

    MD5

    fbf338d582469172d9c7075d366bf8bc

    SHA1

    f9ec944b3d073e8f42098531a788f4ca7af0861a

    SHA256

    9de55666beffaae3ba7beae316ba447f2fcf6784f7d928cde8e0ad5a134017ba

    SHA512

    6ee5a5a6139b90e03dd7076ef4940b5979a9a508c0d74db29bf77d8a462a60c900eadb829dcc19373f8d85c56b33f49cb3560995aba82db3fc0e7fdb8bfe4ced