Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 00:32

General

  • Target

    9d371cf439819d4b433a661e2bee427f3b1adc4aa2885aa6055a2995dc52c5e6.exe

  • Size

    36KB

  • MD5

    b60844e4f7a566caa9dc9ce943089a08

  • SHA1

    fe141e417fff13983000e14396d133b96f173e4b

  • SHA256

    9d371cf439819d4b433a661e2bee427f3b1adc4aa2885aa6055a2995dc52c5e6

  • SHA512

    f13f18e594d3ed6050d6844fe519220c7bcd83c5274928168e5b1d4749e4accfe34a31ac4e72f79d4825f7c329eac7c47828f4f0b8033ac21da3949658a40b4b

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHdGeqc4SUqUGeqc4SU1:yBs7Br5xjL8AgA71Fbhva4S04S6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3777) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d371cf439819d4b433a661e2bee427f3b1adc4aa2885aa6055a2995dc52c5e6.exe
    "C:\Users\Admin\AppData\Local\Temp\9d371cf439819d4b433a661e2bee427f3b1adc4aa2885aa6055a2995dc52c5e6.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    36KB

    MD5

    14ab11bd3628e40938e8dbbf41b6469f

    SHA1

    88f595bccd400b248191f9e0e9f4c4d4e3ec017b

    SHA256

    ba3f4a1f9f7b24e89c6e2316974935083acc23d06c212ad262d73d79c4ae284d

    SHA512

    f037b69288726b6695f117a36af1170d40f5a83082c61e726262bc74f345c654a1edc4d8faef7d403c254d8d2594222259c14cfdfa4bd6efec0868df0de13e3d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    b872238fd9563457a6b066b16a544dac

    SHA1

    45b8a9c1a84519a501e90e7fdbba2d47a2fffd35

    SHA256

    e9bbbcecc4d8e1b5891d472a7e85b9f69d015e7799868dec5ca368e467d6e97c

    SHA512

    f33c6cbf700133fd12032af136c47b5de3d7165a53919275fa9a3750d774dd63138138c64e0fb24c3d9cfe2a94dc3ad342c074e018b589447233640f7345e765

  • memory/2728-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2728-660-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB