Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 04:21

General

  • Target

    e831720fed20cd3a4485154dd0fb015dd65f127e03464db3521837fa5dffb8c7.exe

  • Size

    87KB

  • MD5

    473b023db6e0286853974a24b1ea7e85

  • SHA1

    8cb92f767291f2571f9fda26bf625080874b50a0

  • SHA256

    e831720fed20cd3a4485154dd0fb015dd65f127e03464db3521837fa5dffb8c7

  • SHA512

    3df779c0b8655a3cd338cd2c9e97c513c3b02dac7c7f4082ec713a3f58b2f3094d96c08870e03bb314e0ca271beb92dd6e769a755a4b652b9fb91cbde3ed86fd

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+ejy0Wjy0WzYk8/:6e7WpMaxeb0CYJ97lEYNR73e+eGGv8/

Score
9/10

Malware Config

Signatures

  • Renames multiple (597) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e831720fed20cd3a4485154dd0fb015dd65f127e03464db3521837fa5dffb8c7.exe
    "C:\Users\Admin\AppData\Local\Temp\e831720fed20cd3a4485154dd0fb015dd65f127e03464db3521837fa5dffb8c7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    87KB

    MD5

    9461b183f0743867e6dfdea944c039e1

    SHA1

    a11d7f29ffd9a2dcc541bcc0c3a9db598e9fdd08

    SHA256

    31446d2ac691605a5c173fc6b192ea1b2534680058e465e8ce5a714f4df0eaad

    SHA512

    d285e2f014cc418ca2153ceda9c6f54f4f77f99e88db95ba9dfe3471265dcfa260793c7d5dcc79a165be4545be1beb9fbb428f0dc69f3124a4d81bf9d03140bd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    96KB

    MD5

    b329e19be581f0680ebb7d751cce9824

    SHA1

    efda566b7be984c8e4605a84c1e335265b46b736

    SHA256

    06b886e5d622fe2fcf3f572d87b9609f30c1738ef161cc29d0b47f9a9a42680f

    SHA512

    b8aaa3190a202c1e4965ccd59c6803084369b5c44d76b980ca12e2e9008e96892dc7c7d18a5e96d84e0fb9ed920a5e64cca4de3fa0432a7f622f5b3c926671f2