Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 01:25

General

  • Target

    6d8991f0aadd7cb51f69ce9c269fc9c0N.exe

  • Size

    67KB

  • MD5

    6d8991f0aadd7cb51f69ce9c269fc9c0

  • SHA1

    81a60f30891e3f644b7ceb71d5d04764e1981048

  • SHA256

    9c531380721eec94492eb51c41e61ff189a7cfdf1349bad5d8f87469cfd324fe

  • SHA512

    46f8daeb30985314a889b997494ace07404707eb133fb39384e3ed102b3587397b6429977c77eab917b181885a600a23252a89db7a14455b8041639aa35453b9

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBN10wpAp/lvolGClvolGWxY8SYs2oiLx3Fnx1xY8SE:W7BlpppARFbhbt7Y7WBp9/Bp9S94

Score
9/10

Malware Config

Signatures

  • Renames multiple (3265) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d8991f0aadd7cb51f69ce9c269fc9c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\6d8991f0aadd7cb51f69ce9c269fc9c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    67KB

    MD5

    c2c36d6cdf5f575a0338ac0d0d01a6e6

    SHA1

    ea4e1518a1a868adcc2f8b6bba5b795904b2a61e

    SHA256

    5389d51e11ce3e3577c32d15d402ad1312c6d2fe50e1a6d857ae4d2f990e1aef

    SHA512

    492b0cbb24d4a461d65806451378f7ec9df313169beff30db0e025c1733deb659a55bb35507a0c68471e8a91744f614e06204af88ae0f65c56fb52037e9183e8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    76KB

    MD5

    744fbfba490b69a00e83f5608832f064

    SHA1

    50abf3c79fe951007e7744b2deb4714643a22a1d

    SHA256

    74263e9913ccf787505f8a788de41530f0095bb7ed206a2f59b190bbde56de21

    SHA512

    661c3d2cde44fc7ec053c05d2934ab5edee22033455deea0c4f2a68e8d7d8970c082072c76e75042053cead9d16b0ca92207fb688360bcb92fadebe8fc21eba4