Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 19:06

General

  • Target

    1b0769482dfa333fdc32ca57d8d4bce4345bca9e7354a80b792b292b420da8f0.exe

  • Size

    45KB

  • MD5

    401132920d6890bd7c4459dc1feb2967

  • SHA1

    a4adb09429caa3acc50d8413dc61b9333befa968

  • SHA256

    1b0769482dfa333fdc32ca57d8d4bce4345bca9e7354a80b792b292b420da8f0

  • SHA512

    3da3354701fd5be92539c88bae43ef706b9481af7120b13184f81cf86eb9bbf3d0ceda301959c98694061fded345a2d4a2803921bc3b71a29d3c5dfd656ef96e

  • SSDEEP

    768:/7BlpQpARFbhefnj0Tjfnj0TPuQogKO4iJfogKO4iJEovdcvLei1xaovdcvLei1V:/7ZQpApouADsovdcvL1eovdcvL1v

Score
9/10

Malware Config

Signatures

  • Renames multiple (924) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b0769482dfa333fdc32ca57d8d4bce4345bca9e7354a80b792b292b420da8f0.exe
    "C:\Users\Admin\AppData\Local\Temp\1b0769482dfa333fdc32ca57d8d4bce4345bca9e7354a80b792b292b420da8f0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    674fc4fab5c91d640ead94ebd8a3d563

    SHA1

    ab01e3f40678b2cf08d63437643e297c0b4747c8

    SHA256

    74c66fad8481d8873e3c43a4879aa132821b7b7bb2a6e36d90221de933a750bd

    SHA512

    94e479383a271de4f66a4eee2238cbad930352a7317623d7f2d4a212f2e86381a9b03f4275351ca1d305f30ca0afdf3e0fb61f862693880c1ed561476268d389

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    6b5ba42934a6da50db69ae50b3b8fd8b

    SHA1

    41088b777c7fdc78a638ec26ef4f147b5af44ceb

    SHA256

    09cfec1e50703af573cb165c1d151238507a8729009edbd7603e71a645eab551

    SHA512

    1b1dad09f4e59ea588682360e7c61d37554ec08a10f834f74ab2f5b136c8e2f4cbdd7830e6c7a2f4eacfa0feb1955b9ff137c324b6284dd067947b4edd187dd6

  • memory/2448-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2448-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB