Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 21:33

General

  • Target

    0c732f3d49d22a3248ea253235f91410N.exe

  • Size

    92KB

  • MD5

    0c732f3d49d22a3248ea253235f91410

  • SHA1

    adbe852afb42abb5b324b61ec111ab0f00231fc8

  • SHA256

    49d6c1b4f1028f65d9e0a6c33741b8ad314f68734fa51a104cec1aa836f163ff

  • SHA512

    01c49fb8607411c9abb139331c2fd8548cbbe16fae843a6794fc6e577191e299f00a5b2581a045040f3c9d91707055195ed3e7f65068d4cd88e8f7b9dc38e494

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+ejy0Wjy0WzY+LKLE6G:6e7WpMaxeb0CYJ97lEYNR73e+eGGnLK2

Score
9/10

Malware Config

Signatures

  • Renames multiple (3121) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c732f3d49d22a3248ea253235f91410N.exe
    "C:\Users\Admin\AppData\Local\Temp\0c732f3d49d22a3248ea253235f91410N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    92KB

    MD5

    4070d3927f33bd0febdad203e07c20da

    SHA1

    f01bf2b0f904d020d7d5f14142b9dbaf2416df0c

    SHA256

    7ee1dd646e6a3c83642bf3e7599cf435eb8ee8f530fd05559a5852c877f3d98b

    SHA512

    597e40574217ae369f61fd302545ca17688e286670b6a8fca318a4186b6631e56af73fd0e2996ba65cbe2f640024d77ddb9d39feb31ce6e3e4dc8e025869e235

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    101KB

    MD5

    11cb6589bc7bd456ff573b10629e74dc

    SHA1

    db0a9a57b4957e5f11c09346573ba6815f85b282

    SHA256

    8755445622655f34e475d3076ad2eb0d5d3b7571441a6e6f812dff94be4e7881

    SHA512

    6804e6dc1d98760e9a4cf6bd345840c8ad01133122e9bdaf3395baf7f4bcf1293c7f871017a2c9181ecf7bd04bc49599541f9144974e478a304e5128a31a9142