Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 18:28

General

  • Target

    0a1309012a4bf9e028e1e6037a6443a4f27445ffd7e0107fba40ce0a56c73e06.exe

  • Size

    196KB

  • MD5

    bf173a8a59a178e67b43dc26c02407c7

  • SHA1

    da362f7b41035776f0fe902d0d751d4a37a8df71

  • SHA256

    0a1309012a4bf9e028e1e6037a6443a4f27445ffd7e0107fba40ce0a56c73e06

  • SHA512

    cefed7996f480f433ee7ea7430482a8b2c826368bdf7bc701a0dc97e7645042690e9bed17828fd45784ce7cabbe8abcfccbbd3eb9e89d3f59233d207e153fe84

  • SSDEEP

    3072:6e7WpMNca3rytOkWpXfnYRl2l/9HSFHzJ0lBJTzk6:RqKB+tOkWKR0iJ0lTzk6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3265) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a1309012a4bf9e028e1e6037a6443a4f27445ffd7e0107fba40ce0a56c73e06.exe
    "C:\Users\Admin\AppData\Local\Temp\0a1309012a4bf9e028e1e6037a6443a4f27445ffd7e0107fba40ce0a56c73e06.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    196KB

    MD5

    6ea90a34bbfeaec44a8b697812afff89

    SHA1

    798e5feb3bd017ebfc1832cc0f912c2653903d51

    SHA256

    7dea9e7dca50b8d6e783afe8dc12b7bf57e02c7cc55677b4af5ca7c92579b97d

    SHA512

    e7d10fc38c351e5ecc44de9dfb1753bcee453592c10d50ce7e7cfa61eb7c347dddd6fb4fcd522e0101b29a843dd0464017f97783a8da8904270e45a548a98d81

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    205KB

    MD5

    67e689e4b38e803cb7a2ee5947959e0c

    SHA1

    ae2b4f1f77e3da46d654ef1ea8725b8af10d243d

    SHA256

    ff1d556e7d20d497eda19f038ba554c8be25dade3dd8ddd57485b84a1d21bce4

    SHA512

    c78594db0310dc06c2aba7e0f6bd6e19f7c295de7c9da51aa305bb9c5eb6843d4ebb48b26d3bcad96925452fb126647d1601f2b644098bc630d8e251b7951bd1