Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 22:48

General

  • Target

    6f0eb3e12b300da0a5768890f5da9cca858fa952b790576ab4a1fa52e5f74242.exe

  • Size

    38KB

  • MD5

    4147270974e96a0399b4f21964be7540

  • SHA1

    5e59a40b88b3b777c5705c73f0509994fa431e7a

  • SHA256

    6f0eb3e12b300da0a5768890f5da9cca858fa952b790576ab4a1fa52e5f74242

  • SHA512

    6551e34bcde2cea22e433e12e51669bf7f7eab2c7224f0637f7a9699b9df8887130fdc4c36b57d10b23a9204c50941ced5489f10c372087dede2b9bb017cfe9f

  • SSDEEP

    384:GBt7Br5xjLvassAgA71FbhvYD/DggNNHpQKMNHpQKMM:W7Blp2sspARFbhVgNNHpQRNHpQRM

Score
9/10

Malware Config

Signatures

  • Renames multiple (3781) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f0eb3e12b300da0a5768890f5da9cca858fa952b790576ab4a1fa52e5f74242.exe
    "C:\Users\Admin\AppData\Local\Temp\6f0eb3e12b300da0a5768890f5da9cca858fa952b790576ab4a1fa52e5f74242.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    c41d231fd150e7e7bdb6548cd1bf06cf

    SHA1

    3536cb420a1a47a47d151d6c9a63cd304bee6db4

    SHA256

    ab002a078ad1525088b1829949580a55fb93f55451fe0b572e40fb66e938541a

    SHA512

    0a04c9789f5f699e2b8833a1952a17e8d9683f70f0b79f573939810e1057c749d5dc8c2edfc09e35c92cd4bb7470ffd2b6dd4ae2e558e6521f1fc270bb363330

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    870b1c575108fa357333cbc6cbf62415

    SHA1

    e53b81686705a05b352a905d61b1f717b7e3ba9d

    SHA256

    a2386c5856cad0fb3deb22c9314a42d9b804447303b5a909ed1b2d009535da7d

    SHA512

    ee46514ad085bd208a8f495130f8279e4df7d1ea78533f787a204871b7b6bd7cef13876244c9ea5ba5f502af3cb88a736434333610c0581bdc9f4e4c17ab2fdb