Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 23:02

General

  • Target

    6ba2ab853c022a612a2d858b1dffbd5b257ff8da941eadeafd27fb7be47f56fa.exe

  • Size

    72KB

  • MD5

    77238c9ee1dbbc82a15ed9734652ec36

  • SHA1

    92d7a0dc8836bf9b29d3672bbf7bcc0b09e1a6e0

  • SHA256

    6ba2ab853c022a612a2d858b1dffbd5b257ff8da941eadeafd27fb7be47f56fa

  • SHA512

    c1740918b5365efc7ee6ab393cc1cd1651a6e818cf9084d5307765a0bcdd1e557b10572093d6ee82cf288a10ba7dffa489104ec2b46e26bad7429e6d2fdfdd0b

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPfFpsJcFfFpsJcC+3mC+3meDAfABJ6fABJwEXBwzE5:/7ZQpApze+eJfFpsJOfFpsJ5DEcR

Score
9/10

Malware Config

Signatures

  • Renames multiple (3774) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ba2ab853c022a612a2d858b1dffbd5b257ff8da941eadeafd27fb7be47f56fa.exe
    "C:\Users\Admin\AppData\Local\Temp\6ba2ab853c022a612a2d858b1dffbd5b257ff8da941eadeafd27fb7be47f56fa.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    73KB

    MD5

    a303d4fdc986cdf9da87a1726ea57bce

    SHA1

    aae111fee8008b78ce6009a5ae9790d697e1c547

    SHA256

    9891784c67fd70859e9075765968e4366c104415595d544d0a8d6b57b34323e7

    SHA512

    6ae038dc6e0abf6cda65789e64360f0d1eb72ca9c9c039b7a07deebef8f6b22d94de80d745b1712cc0946f144cbe227643c341766baf6cd9df0e456a4b8b0784

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    81KB

    MD5

    057891e1d5cb90caa23767341010a741

    SHA1

    d13c46358bc1ce2660207344f2fbb0007f3824b4

    SHA256

    6f092ef1c7fad70cf521ccc3172e7e491fca5430c3ac54b58f91d8c3d04a5901

    SHA512

    c483e9ea2653c7bec54123e60f8fb87ee8a8b7d5df9012d9766178f1ce32d628bcbd3c31a6937853dc729df5ab3b2a35e4fd9d74c8a641e22e50bccf109f7ddf

  • memory/1760-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB