Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 20:20

General

  • Target

    4943cfe4ad8c088c9d5ab0f85804b343564446b7264a6a4b599468f7c02a81f9.exe

  • Size

    44KB

  • MD5

    6c5b6359d4c4955836783ebc2f11467b

  • SHA1

    bf83d2df53d2790699701d52a9ac229d1babdbaa

  • SHA256

    4943cfe4ad8c088c9d5ab0f85804b343564446b7264a6a4b599468f7c02a81f9

  • SHA512

    e888499c89a059a5a7dbda50f6fe2faa86fbacdc3452b205797f649e87a24be015b8e0ee4b30ce46965f999dcc583831d3135c083d069000726dd56e15cc9529

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNF2B5dB5m:W7ZppApBULcfpHLcfpyD2jdjm

Score
9/10

Malware Config

Signatures

  • Renames multiple (3818) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4943cfe4ad8c088c9d5ab0f85804b343564446b7264a6a4b599468f7c02a81f9.exe
    "C:\Users\Admin\AppData\Local\Temp\4943cfe4ad8c088c9d5ab0f85804b343564446b7264a6a4b599468f7c02a81f9.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    335a21b87fa81f6c32ba0b38096e40e6

    SHA1

    4b851142a246abfc52a29034ac4a2bb0b16eb1e6

    SHA256

    2565f66d96842fa3e857146a156355131cc9577c036c72b14a27f3f4a51067f5

    SHA512

    f8fcc22d31f9e58424c35414c762b70138665ab70f270898a3e07eca81620191b13f43246b176cb89f041bbecf232db407525b4fb2697e95c9ab5d473fcfa829

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    d2b0ac510dd855ad2a0af7d0e4f643dc

    SHA1

    ef265f6438fd34c42a9dc358ac2611add24165b6

    SHA256

    da1de6d3f32060590c259f349fc42df0ce1abb9b38cd3e06fb08fda5091967b6

    SHA512

    4db51b7b634403c7e5419a5612b0b430c9bcafcf8c9faaa3a810bae6350bcfee3b9f55abf85a78f1e700f425114bb9c923b7460da6ad899b82e42755c5b2a20b