Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 11:30

General

  • Target

    b5d0641c0a73cad3678edafec3bbf560N.exe

  • Size

    39KB

  • MD5

    b5d0641c0a73cad3678edafec3bbf560

  • SHA1

    7dd99182228b07ecd052e2b3d61ebc6552e61d7b

  • SHA256

    550d0afa912c5573fa2382371988be84cc3d72d5410906894282c68d82042fd1

  • SHA512

    c1b8a8bbe87f3e4fd92d2cf7fb5bb7be2690b38fc78522c0ccdf622e09bade6b704fcee66f0c9cc2a28b4fc8f0b27564436aeaca329e9fd93e654b763b99dcf1

  • SSDEEP

    384:GBt7Br5xjLvassAgA71FbhvYD/DggNNHpQKMNHpQKMFwS:W7Blp2sspARFbhVgNNHpQRNHpQRh

Score
9/10

Malware Config

Signatures

  • Renames multiple (3460) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5d0641c0a73cad3678edafec3bbf560N.exe
    "C:\Users\Admin\AppData\Local\Temp\b5d0641c0a73cad3678edafec3bbf560N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    13474f77439f71003ece092a612d416c

    SHA1

    8a822387e1b2201c3eb2c388eccb46773932804f

    SHA256

    6d81c0c7ccd3d2bc8ace90bda2fa4d124ca4d915b91622d23db57984a1233d4e

    SHA512

    28bcf237e3e23c58e7f30b8c97ec3aaf28ac98eb0f7035b37928575df77deb6ac4fd4c45dc6b350239ccd78a4b4ff70812d2d9df5dbd728b0a5cdd110de84d00

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    8336c60267336393c66ff8be2ab2688d

    SHA1

    215b7ca850837ce50a0007958b46c787f82a6981

    SHA256

    dcb5a48495daa9ecb23dddb0cd0fe326d3e4da0ad89224cb369b3d7e7fc11c0e

    SHA512

    a91e414e48149493eb69d87a7f3283e7b25f086d2679148ac1bbe21186a342b212e121b34e19b55fdfd9ba15da4d6243762608d4a93ab2217c57ae61e11a866e