Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 03:33

General

  • Target

    e500d03eb3e48822d479ac6d685d7945e91175aa61ca9380b26605337124c210.exe

  • Size

    51KB

  • MD5

    8d87ee478edf2988dc88f8b4a621664a

  • SHA1

    ce9b517dc49d9042288596c83261fc51b6eeeb19

  • SHA256

    e500d03eb3e48822d479ac6d685d7945e91175aa61ca9380b26605337124c210

  • SHA512

    3a6a1e57961ad92fd88e5ca3404d2b7b0464d5199be4add8a94f44c2b4e928fe3cdd31f8d221065fa3935eaa929abd29ca5bdf2e0b7904e151c81a3ffc3ea609

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzS5c5mxqORP+tY/8q8Q8drVIJqt4:/7BlpQpARFbhdS5c5mxqORgqu3Ft4

Score
9/10

Malware Config

Signatures

  • Renames multiple (3863) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e500d03eb3e48822d479ac6d685d7945e91175aa61ca9380b26605337124c210.exe
    "C:\Users\Admin\AppData\Local\Temp\e500d03eb3e48822d479ac6d685d7945e91175aa61ca9380b26605337124c210.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    a50c437778bdd6a3d5c88c96c9e50ca2

    SHA1

    6ce886ec4e162539c5efca7c85fa36e15d2924d8

    SHA256

    58187d3b2663b20ef9138ae6b61306294dbefe0b4d2cefaf2e055a2ca6fc9e79

    SHA512

    1adab7d430ec3dd295cf97e098029e0c7ffc6cd48ba0c37110e86e66ef7a5ce0d700683badccb299def49d26ff75f75e834535c0869625fb4748ccf537e5b93a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    aeb94fccb9e11f6156125338fd4b2f81

    SHA1

    0734dacdfcc372f53ef8a448065fe0cb862ff71f

    SHA256

    7dad3a3032e4f549e1b6001a23c6ae30fc3bdce8f9d215208b88914f6ce8be36

    SHA512

    75d048675916e59a8307fa89acff0b098d667c70966921ebd3acab5854120149e86aa193f4ea41abf19df33614a32efe717698c5e7c4e84649adea44659fd3df

  • memory/2372-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2372-666-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB