Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 19:43

General

  • Target

    34aba8456ddef106e58f2ed8cb16dfb2b1360d9570d6782aae36adc28514d839.exe

  • Size

    78KB

  • MD5

    b212438d28c94a09037ef7302eba7311

  • SHA1

    29d72c2001857d946c6bdb650ca9ee8d2c944f7b

  • SHA256

    34aba8456ddef106e58f2ed8cb16dfb2b1360d9570d6782aae36adc28514d839

  • SHA512

    3b43ddcb420c05ddd8ffe7a1b080ae088296e5a2d9bb056cce97cd5848cbbd91677d1f7c81da3333caa8000591369a071b57ccced6643a2304dfdac1a2ea8d8b

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvJUfWGUfHjtmjtd5NaMR5NaBQp4g7s4g7M:/7BlpQpARFbhiWb8naOnaBK4g7s4g7M

Score
9/10

Malware Config

Signatures

  • Renames multiple (3729) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\34aba8456ddef106e58f2ed8cb16dfb2b1360d9570d6782aae36adc28514d839.exe
    "C:\Users\Admin\AppData\Local\Temp\34aba8456ddef106e58f2ed8cb16dfb2b1360d9570d6782aae36adc28514d839.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    79KB

    MD5

    5bfce440dbef92d669f0e384893fcc1e

    SHA1

    98354e8500078049b06c07c4546cca7a7f5935e0

    SHA256

    8dedd4c338a7bb5e3af3f78c8868c512a2544faf49c9012618a0f1654d92f7f8

    SHA512

    5120526181a5add0e6d5f793c4430860155e90bd1a52d6e11bf278924abbf28b3dcbf3e7117ce9164561b4d1abd26ec903ab31b1911e392c4724404226f30a72

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    88KB

    MD5

    074b2cc0f859617d40ec1359b603bfc4

    SHA1

    d06a8c122e29c1522fab3e1026b01372f8d878cd

    SHA256

    9073c38cdbfb4fd5e01d3dac029bd64a6dcb1e133884719795a439ecec4f20cf

    SHA512

    7d9385a711ceb7e85f50a0c8eb31d63456ac9362b37d20e6aed15ce6f7aaf8c3799ec04cb513c68c30cc580af0ba10edefbf0cd534425ebd06d87fa5be5fbf70

  • memory/112-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/112-660-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB