Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 20:13

General

  • Target

    43418275b4d9b760b119963946bf670cd40ac6c864b21e8d29faa5ddf289360c.exe

  • Size

    106KB

  • MD5

    81ae76af01528d6085cb8e18416373a6

  • SHA1

    5b639c18b7cfa11db3063912a77c6f7dfeb36be5

  • SHA256

    43418275b4d9b760b119963946bf670cd40ac6c864b21e8d29faa5ddf289360c

  • SHA512

    018cd067dff4acd172843d54b1f2d2f87125c31b35c4be6353b4c9c5fdcbc3b9067d344dceb71d2b49674129fe0c960e5ad8b4da534c7768db84718f427b1871

  • SSDEEP

    3072:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFslEhLfyBX:PqFF2Ie+efsim2g

Score
9/10

Malware Config

Signatures

  • Renames multiple (3494) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\43418275b4d9b760b119963946bf670cd40ac6c864b21e8d29faa5ddf289360c.exe
    "C:\Users\Admin\AppData\Local\Temp\43418275b4d9b760b119963946bf670cd40ac6c864b21e8d29faa5ddf289360c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    106KB

    MD5

    574777f4f736083d7962d326a3e1f36b

    SHA1

    c2a5b9343cf6de7b740221ee98f119263dd154df

    SHA256

    216c14bbd062cd597110311c70ac805e3698a14dbae5d0d28fddf6604f5567c8

    SHA512

    a210796a7b64334249c5fef1e0209183ccdd3ebea2c93b4664a79910e8be247569973733a2fba7f0beac81fd88732dd0eb6e8f3ca5b4eb72b0b48721082d03fa

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    115KB

    MD5

    f95f20686f96a349a1b210ef2bde510b

    SHA1

    022e70d7b073cd3b344cdee7e17885987433bf66

    SHA256

    e10f8a3b83ee6fdf901d4694bb1b87f3a007470d970674f2b9e2bf6f3067fd65

    SHA512

    799b3c7f166b82ed5b7e29761dbcfe94b49c6a2288537b7e56c0f0739e753c69bd2f9bff6663d41881dbde87abb49c1282c07d4c3a2b3d22bae87651f13aeb61