Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 21:18

General

  • Target

    502105e0e73fb04e11c24468c23ddb10e47cefa12c0c1f03a479765e50b01011.exe

  • Size

    109KB

  • MD5

    521778a2d91ce4dc1c689ef0e2987012

  • SHA1

    ee57f8c8a9318d6d676bfc31f5beede5f75a2200

  • SHA256

    502105e0e73fb04e11c24468c23ddb10e47cefa12c0c1f03a479765e50b01011

  • SHA512

    117921a812a916e359c9af8d28ac3eac3cf5d5c25b23df0bc468b1de46900f965974cc29c0ce3c39be80a4236e1667f66c945aceb8a4e72899db65326f8dd69f

  • SSDEEP

    1536:W7ZDpApYbWjIlE77ufL2e+efZwZQ/8S/8z3MLD9ko9kc:6DWpwE7oL2e+efZwZ08i8z3MLD9ko9kc

Score
9/10

Malware Config

Signatures

  • Renames multiple (3611) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\502105e0e73fb04e11c24468c23ddb10e47cefa12c0c1f03a479765e50b01011.exe
    "C:\Users\Admin\AppData\Local\Temp\502105e0e73fb04e11c24468c23ddb10e47cefa12c0c1f03a479765e50b01011.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    109KB

    MD5

    63f7cff3ba25e5736e612899bbd92678

    SHA1

    d60d116040e1c7a9cd5b026812b19ceee607a301

    SHA256

    adfcfe2d8dadc3e96cdad43d78fbff55edd5b0d9c1b5049518f3d3a893bbc0da

    SHA512

    bd5fd02fac98dfe8ff457fb62f8b178beb3df679c2c805371951f4acd517c3858af857b261e0aa0cb235abba73cdf1bf1f4118335d11d78fa433d2c545409a4b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    118KB

    MD5

    6bdb291322d317a4dc85d923d0faea9d

    SHA1

    ece493eb3daad89c0d9db190f643d4c615d3e76f

    SHA256

    e95c90d212d24362133927d2a362434ff07f8e9d4a93f85a38abc45f3b797f9d

    SHA512

    f076a9da0cb5c2f8ec5b56f362d7a82c1d7fd44ca09e9535a1d9f104ff0f15fe9ceb75cd563af58e738b5bea0b72b13c3d03e284f72888320411d4fc158b4106