Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 07:56

General

  • Target

    76c7f3a500a3d42b82595fdcb84b90a0N.exe

  • Size

    42KB

  • MD5

    76c7f3a500a3d42b82595fdcb84b90a0

  • SHA1

    a25a720688bf9ff9bbcdde5356a45495d4b9ac04

  • SHA256

    a8fb0312c0474426caff47a03a23b7a237e32fa1fe163525e6b365aed06956d5

  • SHA512

    93d806bb88e6dba84a5ef5e30717d40dccaf1842ecc20bb7d6694fbcd323fafdf78cf482c2a4fd41aeeafca05837177daea31e3927d47ffdaf239d058740c08f

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpT4wWJ:W7ZppApBULcfpHLcfp5WJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3437) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\76c7f3a500a3d42b82595fdcb84b90a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\76c7f3a500a3d42b82595fdcb84b90a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    ccc0e46149548558b8d45483fc13d9f0

    SHA1

    3f6fa4fcee6e58eafc4959518717d1cc68ea01dd

    SHA256

    ec906e70b420e99a3735023754b0a4bda0af2c8c25dc4fb1be04233cb46299db

    SHA512

    56feee56abc5002de98c867d7358ac70a1dad49926d066e745812c1ae54e89045a335886710bd52168dce41869884f2d155d743924aff3c93f358a42af5da998

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    c12fb9f43e44bc8bff7843b26344eff4

    SHA1

    48378ec83892bf44c86cc7e574a51175ebc9b0fe

    SHA256

    c6d203779e7d390fdd994022e127d5b54e92c0ea2e337f4756bbc04991fe39ad

    SHA512

    0d18b7dd150f673ddcb38f9751d1dc9bde4ec1323131149f5034339c585a9ee7aecc6a29ca673f0db90d8be3704ec72b84e2fe4ca7e685fb09c91ec15225b9f5