Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 10:14

General

  • Target

    864e87ea02132bee0873b0c3bca03f80N.exe

  • Size

    72KB

  • MD5

    864e87ea02132bee0873b0c3bca03f80

  • SHA1

    8e40d4e02791f4ddc3466af0c127500a227cd0ae

  • SHA256

    1ee3d23456fe1c22e798655d92e09cdb77d8fde191b0fd7d95b63fe0b5afedb5

  • SHA512

    226c1d8a6cec7dc08134260dff0e7bb6829e0fc6d145c6c3d052f98bd195f95e558d9a2197139c47c9dea5418ad66c6bbc96b43e9856638080423a3ab6c2cc4c

  • SSDEEP

    768:W7BlpNLpARFbhblkYlkrt8PWGoPWGqMs1MsR5nd5nyQG+QGHnTVwnTVRiV:W7ZNLpApCZrt8PWGoPWGANdNykloziV

Score
9/10

Malware Config

Signatures

  • Renames multiple (3097) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\864e87ea02132bee0873b0c3bca03f80N.exe
    "C:\Users\Admin\AppData\Local\Temp\864e87ea02132bee0873b0c3bca03f80N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    e13eee15c7b856f0f807539dda28b643

    SHA1

    03a82ffb4ffefd25013d47484e1a7c96bab30367

    SHA256

    4a568b419d5cffb6ea8a21e0bdbfe726e160c07df6045858e0c7ef4dec946356

    SHA512

    43ce8160fc7b0ff3e80b41b58f9e4eeef25c8e9201a69bc25692a9d90b4968e456246acd8293191fbee9ba87c57e6d0f5b1e78f3fdcfd308e75cdddf8ce9df1c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    81KB

    MD5

    84cd4ef756c1e53de02b56f0f7848a79

    SHA1

    3ef8ca3c8d8dfdc6dcf5d721f3bf2c36448b88ee

    SHA256

    04844a1c409ac01f4c6850ad9b6b9eaec8ef73fc25f1eae11d9c182e74a14631

    SHA512

    6a4d1f5988e09bd7aaf3b6bdbc642b760081d71154b71ec7f781b40b10e55f2ca35f540982ace09dd55779f4a9f7cbfda887016315a55592d54ea628a5fc64b7