Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 23:03 UTC

General

  • Target

    778b29fb3570e62114e29dab7c2e0dd7b1fd3b1b65df0bf9f546b1abdd59970b.exe

  • Size

    52KB

  • MD5

    561ed89c3ab87ce3a34d78d2ce230d83

  • SHA1

    35911b72b8a6d8f4de9412c3acf9038804c0c8c1

  • SHA256

    778b29fb3570e62114e29dab7c2e0dd7b1fd3b1b65df0bf9f546b1abdd59970b

  • SHA512

    60c592ad9f7919cbfd4d4bd66c34af3be6f31d1442de4b5571719781c42dd2539fe3e8439924f07350a9463a22c80f4a287b3f96c95e7273c392289fd09adbd9

  • SSDEEP

    768:/7BlpQpARFbhq1KX101je2/Qdme2/QdAe2/QdDe2/Qdme2/QdAe2/QdA:/7ZQpApq1w

Score
9/10

Malware Config

Signatures

  • Renames multiple (3772) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\778b29fb3570e62114e29dab7c2e0dd7b1fd3b1b65df0bf9f546b1abdd59970b.exe
    "C:\Users\Admin\AppData\Local\Temp\778b29fb3570e62114e29dab7c2e0dd7b1fd3b1b65df0bf9f546b1abdd59970b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    a536a18b9b0e93b61d2e60a08962156f

    SHA1

    a931accbeb8e91dbbddc26bca1dd55cc3038976d

    SHA256

    a3a6063314e74e9aedd1c01da1980688ac72d4c65b340889c8de545cb6f2ce2c

    SHA512

    fc9e5b5b3353bbf9759634df6c8c6e8cfbea18929dd717da8f9651ebdf99e58668bb56cb0bfbed5ad35368417a0c67fbe25dcd79cfc6b27a424914bc2cef6471

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    453d71ff5a5a3162c0648523fe99d93a

    SHA1

    ecf590102abf104290ad849a8e841cc936abb3e1

    SHA256

    1178d41290ec0fa85230a1b9e981198a8cdf18a4a42bc73b5bb02b40b2319dd8

    SHA512

    1acfa113f0511329c56483b460e58f2d5e787e8e08de80055090a67d51f7cfae3bbe96f5df77d9c53040c0c8c5f4da3b5fcfc2656251dd340f917b19f67e46c0

  • memory/1628-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.