Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 23:08

General

  • Target

    77627273be28004f9d039900428d32aecc0da6350ca2183a0ecc8224b82838a1.exe

  • Size

    57KB

  • MD5

    aa969289eb6944adecbc69a4c0d010b4

  • SHA1

    1230ea4963413c9e43623c3fb6ceed0953f7f454

  • SHA256

    77627273be28004f9d039900428d32aecc0da6350ca2183a0ecc8224b82838a1

  • SHA512

    2f289e58642d941ee51f8d32e1f0a610e8376a4681c9c025bf414d080b49f3f769af29abf43456341880aea8cf0fe62d2f39a15c6350e17b509fbe1daec0a8a1

  • SSDEEP

    768:W7BlpppARFbhknrzzA8JQ2AdJCzA8JQ2AdJcUYU30N7AVn0N7AVaYHGejGejnA2M:W7ZppApkxUYU30NQn0NQaYHGejGeu

Score
9/10

Malware Config

Signatures

  • Renames multiple (3774) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\77627273be28004f9d039900428d32aecc0da6350ca2183a0ecc8224b82838a1.exe
    "C:\Users\Admin\AppData\Local\Temp\77627273be28004f9d039900428d32aecc0da6350ca2183a0ecc8224b82838a1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    2c32db6a60a1cbb5b3963a78adc0cb90

    SHA1

    e81653fb8c06a10ba75fad80c636a1a7ecc9c3ae

    SHA256

    6a2133e138c75b9c81a70b7b84fcc644050b14a629451ad4676c4fb0737cfea6

    SHA512

    f5b73149a404a295f8c4bbc902c2c548fd9d41ecf3fde324208c50916862116722ccd12640db33535b3db5a28aea97d384a9ee7227af34f89154cd270d297a52

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    5caaa00dcd5cb208ad1cc7b563b7a5d3

    SHA1

    f2b31e2c0e25c287f9ba9ea85def7f341369d94c

    SHA256

    30da1ab8c0eba63a02a29b6124fe7766f7c0548561787b7a78a9da61cfe6b992

    SHA512

    b8099d8f0a4ee372e9b7a6c9cb6ce674e00d3ab766add96e237367a4365a7f91d551044dd6ead976dec7489141ae6133d39d14d917a844f95b5aed94bb856730