Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 19:28

General

  • Target

    223cd2fce22a683b778ec711227da6128a4871d235746b8d7fa456424d9b150e.exe

  • Size

    75KB

  • MD5

    47282e47200fb3e282c2c2034a02ef60

  • SHA1

    0846657fe2f481a4a101955e64f4415461ae466e

  • SHA256

    223cd2fce22a683b778ec711227da6128a4871d235746b8d7fa456424d9b150e

  • SHA512

    93d1364f6bc389f7a56e3ef80352c9a968bb49c8d9b5b95e167a1abca4ece66ee5d0823cf41cfac97dbcbb072d587fbbf1b31ff842208d0ab58085bc36afcc0f

  • SSDEEP

    768:W7BlphA7pARFbhvOsTKnKqtb4HBZjlwGpCYnigugqOzM9bdifwMtxEwJjlVki/+:W7ZhA7pApvOsOKM4HBhaGwOQ54xEIjl0

Score
9/10

Malware Config

Signatures

  • Renames multiple (3693) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\223cd2fce22a683b778ec711227da6128a4871d235746b8d7fa456424d9b150e.exe
    "C:\Users\Admin\AppData\Local\Temp\223cd2fce22a683b778ec711227da6128a4871d235746b8d7fa456424d9b150e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    e292d6f4b3b8afadf6ce764b9490d37f

    SHA1

    418397178175a5777c498c04779cdf99b22585aa

    SHA256

    3d9a4daa70fb6d4222c97189632bc50a784e04f3803fa00c1a5a04e12b3670fe

    SHA512

    4fc4bb2e4e49c84bb2762d563dd074eccb471a504014f91646a1bcacadf27f66abe430508621f3627a68f2d8d49511c509a234ba5e9881f6fda54be336e7562e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    85KB

    MD5

    9ebf18d321b1c02b13727303fc340bfb

    SHA1

    6d529755e0815d90398162b30d0c509e62a77322

    SHA256

    b669626d134ce53b8ba64224b1903053ec06cbb5e4210729787dfe3c387ef2e2

    SHA512

    c0d0d318bf4e18ea61ee325d22316897c7f2c4b8fa07f0c0050d9f3abae0c1903ab432f93bc5443e743dad8626ae06625a9dd0446305b793fc6241beda54afa3