Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 03:46

General

  • Target

    ead0b1be8a879a4a31445353d043717f4a59f4e5d8f6395ab6a840efa1e54a22.exe

  • Size

    43KB

  • MD5

    caecf28240857a47c1d248a3432f97cd

  • SHA1

    7152740e63afd217673259f1581ee8f53ebf47a0

  • SHA256

    ead0b1be8a879a4a31445353d043717f4a59f4e5d8f6395ab6a840efa1e54a22

  • SHA512

    ccd14c7b82d1083af4120cc83dcc8cc6957c74ccb82aac0353346a6dc5e889ecead324a38d01f1f343e92ee3a6d089dfe29a941cef0f683245ac14755a4defb5

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBN10wpAp/lvolGClvolGwTCus7sj0h3MM0h3MR:W7BlpppARFbhbt7Y7wTCg0hcM0hcR

Score
9/10

Malware Config

Signatures

  • Renames multiple (4112) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ead0b1be8a879a4a31445353d043717f4a59f4e5d8f6395ab6a840efa1e54a22.exe
    "C:\Users\Admin\AppData\Local\Temp\ead0b1be8a879a4a31445353d043717f4a59f4e5d8f6395ab6a840efa1e54a22.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    d1e6fce494ed9769f73e01e85fe04914

    SHA1

    7a6ee94d8459e39dd63017bdb0a244a4ed8aa705

    SHA256

    4799248a09ec65a7a52acae3f52be9fb072e42c903902608b0ea7486738861ee

    SHA512

    20b805070a987100bcda9433a657b82afce77bbc2a93d4420ede8e66ee52de6cbc98c02ef3e1754676195f3b7e4fcf113db5348cc7199268b9747878c7dfa265

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    7e01ae40ad3f63ff82194475e0091ded

    SHA1

    cd0445e29a5bd014a66706a7c8e308b03b2f435a

    SHA256

    87c8baad32d87551283994fd9d60ce4226b438ffb36c94132ee6f434a0069ce8

    SHA512

    381c5c7920e926f454f1387fd5930a27d267ed871abf4c220869bf4eb6f368ad851c151972c8fa992af803c85392cfd6495ed1ad1ee61a9c3b97a3b66c61b17d