Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 21:13

General

  • Target

    48b11c223e18db09026763ae533147844e0832aa115926cc233cd69ded3fe431.exe

  • Size

    52KB

  • MD5

    48fc8d1f6b5830cecce3f4bb4fc20bfa

  • SHA1

    11c892f78d90fbcc0dc1bd31c0eff4187e2910d9

  • SHA256

    48b11c223e18db09026763ae533147844e0832aa115926cc233cd69ded3fe431

  • SHA512

    fe06306a57ad8bd53ad678d5cddb8ec3d9dfc0db4484a068550dc014f381e93a5952e574a917862a65ff2fc57516607f6e76e2a97987aff63a006e35405ac7e0

  • SSDEEP

    768:/7BlpQpARFbhfyiyooa0OMiJfoa0OMiJ+PQT8Yi1xKT8Yi1xM:/7ZQpApHzoPQYGYQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3757) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\48b11c223e18db09026763ae533147844e0832aa115926cc233cd69ded3fe431.exe
    "C:\Users\Admin\AppData\Local\Temp\48b11c223e18db09026763ae533147844e0832aa115926cc233cd69ded3fe431.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    9d25573ee9267dff53f2e1d7ab84f96a

    SHA1

    9b5d98ab34db39fb6d3c1480d5d8d2cf909f460a

    SHA256

    117849a47ac0b72f9a972c0e485ed08dd53114d41d69b7fd6919c3db8859d3b0

    SHA512

    15955e041c92ad1ec17052816c91b171709d6eb17cdb5863f43f36dbfc245e1943f616107538b6bd97178fc6b998b5a7f8f4708782e5b209ea011b0b100988b4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    0bad7722f1081998a38547b30002fb37

    SHA1

    8b6aa4c152f78eb4da0f0a8d6e6b7cb95b6d58d4

    SHA256

    b9cec24982d68f505b308593197cde8e408fd9dfe46222b9f75b9a39b4b336ac

    SHA512

    722c53bc85c38b1fc8adbcfb71aa8ad09a46929b325c3c5a7993e8cfe9ea8dccd6d1d164812669ceb9c5c45312a2a9a5791be2e389fed39d23353d7403fbedbd

  • memory/3028-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3028-664-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB