Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 19:19

General

  • Target

    1e5f84715de35183a8a62e50175681e72e56b1cee60dde08ff846b37ed7657e1.exe

  • Size

    97KB

  • MD5

    6e1cc5cd5e345ed2c09e0c0ec804a900

  • SHA1

    419c0dd7796850841a0a105f8172b9ca309871c9

  • SHA256

    1e5f84715de35183a8a62e50175681e72e56b1cee60dde08ff846b37ed7657e1

  • SHA512

    ead50f27bb751e9b312adef66550e6d781fee20fc5e838075506bb75764c47c90793f19d71ed0f3e976516cdcec1d69edc7d81981a06d5e4ab52554b74e39b40

  • SSDEEP

    3072:6e7WpHIyRF9ESWu0SWujKsKRsP9fVL9ih2x2x:RqlIyFESWu0SWu86jYh2x2x

Score
9/10

Malware Config

Signatures

  • Renames multiple (3456) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e5f84715de35183a8a62e50175681e72e56b1cee60dde08ff846b37ed7657e1.exe
    "C:\Users\Admin\AppData\Local\Temp\1e5f84715de35183a8a62e50175681e72e56b1cee60dde08ff846b37ed7657e1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    97KB

    MD5

    4f145912817e9db1b379d058b9a858f9

    SHA1

    b2be025ac4a2eed55e1d2fb784c4ba0ab6205a2c

    SHA256

    4b841327bcfec965c29561343dd0e4c30c9f1f1c02bf5d6a44bc67f9c8b2882e

    SHA512

    ef1fd9aa33c32427b4ef76b61fd6c0c46f7f7bd83f6637be6fc51964ad1e6c08e312b49192e4d72097c43bb987d9ba4264c99dd55d5ea58c0c07098c886b960e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    106KB

    MD5

    49c477cdd23996c9421c2d5231a351be

    SHA1

    48492d9a104a4fa87a3e8b21a47608244b282c50

    SHA256

    95601e3026fd9f73540f256afae42ff735f499de6fde6cc029a37d2a566a02de

    SHA512

    ff849aa83d5a984a8e7f9ad7affa45a6aeccb7a1f6c7ddc647b2cfef363de5f02cfa907eb6d2dcff20922d3920dff4c1f1b593879d18a027aaaaf799ff9fe350