Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 04:00 UTC

General

  • Target

    4e0074d14aca260121314c260ef52bd0N.exe

  • Size

    54KB

  • MD5

    4e0074d14aca260121314c260ef52bd0

  • SHA1

    4bfc4206ed87f4e2d7825013dc55a312b8e5a7bb

  • SHA256

    acf5d3b72d08fb309ab9de11ca050d0b0629797ebf8a7ce207f18331e73fbee1

  • SHA512

    3a98f8d4603e3bbea4115872b852d1d80ce85ce36b0bd88ed20974d088cbb062e452caea3751fec42258dca2567b528461f477b7c75dcfef31bd8a9047c77dec

  • SSDEEP

    768:W7BlphA7pARFbhvOsTKnKqtkYi+nm5u5+:W7ZhA7pApvOsOKzso

Score
9/10

Malware Config

Signatures

  • Renames multiple (3366) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e0074d14aca260121314c260ef52bd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4e0074d14aca260121314c260ef52bd0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    cde0ce740bc3c1a76d0446413751db58

    SHA1

    17c232dc51c9543768814c914ca6d589aec7edff

    SHA256

    1e532b5036a3e24fa2ce3e7edd1d3d85bb65ce818a1286f876f3380e08765d95

    SHA512

    80b31791665e1a218ebfb6031ff90c498f2a05854dddf9050fc59817e60ed1719eecf9560f9c53e7c3b26db934ab7ad811c3c76004251d09a1d7691724bc9468

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    63f25ae77ac2dc431fdbcf0cb1bd1fdb

    SHA1

    de21075250a8247d2a744780f1410ee8ed429a79

    SHA256

    3dd57cab0b31e3831590684ce2ec128846d678aad801c70db3eeb3c0358795bc

    SHA512

    9ca47d20da0b239dd6ef41f6dd0de6d890d7457513c5ca42163e5414c5c213531a27209dc8847ef6894a0295010da86e5e46f8b4a8586c9e4598101b74193e25

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.