Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 23:55

General

  • Target

    8c9b355c643c7a175e406a8e4708e3d67416dbcb491ced63ae436eb628bac4f6.exe

  • Size

    68KB

  • MD5

    954d9d976cfe3694d954c9998d96eb0a

  • SHA1

    ef769b39e9415687be7bf906627d8893ad42d5ea

  • SHA256

    8c9b355c643c7a175e406a8e4708e3d67416dbcb491ced63ae436eb628bac4f6

  • SHA512

    f8a69fd5e020bee5d00d07662008381f79e97eebdb273994702e6583978dcf7228b20adadeca300c38a785d32ee5338035590d1a706c56d5c2c9f3be3ce99ad0

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJ9VD6NVD6GUhYTY9:9QWpze+eJfFpsJOfFpsJjub89

Score
9/10

Malware Config

Signatures

  • Renames multiple (1030) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c9b355c643c7a175e406a8e4708e3d67416dbcb491ced63ae436eb628bac4f6.exe
    "C:\Users\Admin\AppData\Local\Temp\8c9b355c643c7a175e406a8e4708e3d67416dbcb491ced63ae436eb628bac4f6.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    68KB

    MD5

    8440f3fa823ac3d33adfb700825a42fe

    SHA1

    65148227ad9412e55dcaa73824a81e50022bff45

    SHA256

    c7085f201727869fe81177f2f47ba9759d30847239356c0ddd38070e22981e9f

    SHA512

    a5dac385298f1626dd8eebd8a8466f5c58873c247a30e657f8a6bd4458fcae2d3e61391a0b6f46c96340912f71a02066780b7874bab1d31ef24b406f09195e94

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    77KB

    MD5

    7daff43a3bc5058558ce77cd90a5b4d8

    SHA1

    0ddf0231657fb9b5e64b3650de6bb7afcc4ceba0

    SHA256

    d9e88a91e2fca1ff3baa0abb318bdb62910443fb3b4c522bb78384ccea44e672

    SHA512

    0c254881f59fea24397e51b63a6a25ff5a158eb6a3ab5358729b9493b14301b0dd8335a6a8858b2be199120b08bdb2cd2ada6dbbc0b506473e013074e867b6a2

  • memory/2220-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2220-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB