Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 00:36

General

  • Target

    25c856a1b3b301e66d11b98225fbda20N.exe

  • Size

    104KB

  • MD5

    25c856a1b3b301e66d11b98225fbda20

  • SHA1

    c9e7eab14c3d56a54b1b85b970b90a979b156ab0

  • SHA256

    134aeeea038b401cdecec14a9d80326ea886d3a624eb79348cefd04e21bf4516

  • SHA512

    fd4a75d95590510f6fe7b9e9440e33bcb7ee197d9d76d9d512722d4b1a6f67bef84398edf7aefe3ba9f0e7e0da1473bb1522dd5cfdccead66176aca32dbe7691

  • SSDEEP

    3072:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFslEhLfyBM:PqFF2Ie+efsim2n

Score
9/10

Malware Config

Signatures

  • Renames multiple (2934) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\25c856a1b3b301e66d11b98225fbda20N.exe
    "C:\Users\Admin\AppData\Local\Temp\25c856a1b3b301e66d11b98225fbda20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    104KB

    MD5

    e7c2d98c3e41a65c009c0ac6b3d1f2bb

    SHA1

    c661ebfd986edcfeb592d210930c42d9fd9dc8a9

    SHA256

    02425a038b349fd581d1ed13f18f85dc57f42cdcb442ffd6cac88f3c407fc932

    SHA512

    0b4fef14de256a5f0d39524a9c367f8327e2c62fa34c136cea194e03328a991aeb247aabf1c3162373a7928504a6fff402799af86d78f776dee25b57d6447af5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    113KB

    MD5

    bdd4441aaea68ff652ae48b1ebab5d54

    SHA1

    d7c11a84e82670dd1335925e888f2d000f52dd20

    SHA256

    abb377553ab93de4ecb6d7c33e5f0db055b091cce311bd60839e19379b29ca96

    SHA512

    549156ce3a02b710152236739159227b273a71a1392aac2e43d77b74aa536d5a3733ecc5f499e1f1d7b697fa4f6782b5514580511f4ff0fe21db0614ac3779d1