Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 18:19

General

  • Target

    04fc3f0f6329e752af1c53cf4761b3dde41352918235253992a717cefa160eca.exe

  • Size

    57KB

  • MD5

    4f487a9421f5ed437282d652384aaea9

  • SHA1

    eb831359f8b18fc55cbe3f4bdc8f519cc521088e

  • SHA256

    04fc3f0f6329e752af1c53cf4761b3dde41352918235253992a717cefa160eca

  • SHA512

    98ed997bd45eed1f5559e35fb8b51a62348e1e38ec57250b1dfd8705c0e40461f51686f4c831ab714ad43a88cacaca15c6e88b0dc163dc961f405611c96a495c

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBNKVkVYlIAItCCIntkntV/PMpMf1Dxp1Dxw:W7BlpppARFbhFAxC7ntkntV/kCHRw

Score
9/10

Malware Config

Signatures

  • Renames multiple (3800) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\04fc3f0f6329e752af1c53cf4761b3dde41352918235253992a717cefa160eca.exe
    "C:\Users\Admin\AppData\Local\Temp\04fc3f0f6329e752af1c53cf4761b3dde41352918235253992a717cefa160eca.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    324400bf8a7944e93840ad2c879735df

    SHA1

    341701dfcaa1bf40975db4719a8f39c82efa15f9

    SHA256

    07a6042a56264c662d08634b2d26cf64c3b11662d4bb5ce0867fa9d7ef6e5f8e

    SHA512

    b8ec61b6d9766e23894143205f8360952d6dfd22f2c5370df04966d738fe6b285603070f50b9c3354dfa27e3934e43a2b372c95cbb05b533b2e00df152c10b1b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    4cd70d98b96836e8b8bd16ebd88cc39b

    SHA1

    1506a184715e83c12b0a893ccca183f3282616e2

    SHA256

    d2a109bae403e4451c4f44042396c75a9d82988006f5ca2577f9c83f46d5494b

    SHA512

    01d9e17e048ca1e2592d54b3a11e610057140d3cce34227f16033fc654f856518c5296b0db8648f554de9dc282455995bd3557bb8a4c0715a555fa6f763f51cc