Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 09:42

General

  • Target

    409f15e03de4328372235a93c81f2480N.exe

  • Size

    61KB

  • MD5

    409f15e03de4328372235a93c81f2480

  • SHA1

    57b4a3ce858b1fd17ed83168dfcacc90f2743f4b

  • SHA256

    7f3a19142f7da149bc4f86778b77476b3d5922c45b76ea0cdb40d6c38f303b84

  • SHA512

    9d1bc47355ad29a6e6172112dfc67716bfa3f707a5534631e978bc863bd8125e46dc24489702ecf8a98492a78792c37669cde357bc47b23cf99aa7a21705ddfc

  • SSDEEP

    768:/7BlpQpARFbhn54fmiy+3BVr54fmiy+3BV6nE1016Y/jY:/7ZQpApmi6nAY/jY

Score
9/10

Malware Config

Signatures

  • Renames multiple (3262) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\409f15e03de4328372235a93c81f2480N.exe
    "C:\Users\Admin\AppData\Local\Temp\409f15e03de4328372235a93c81f2480N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    61KB

    MD5

    318041327b1745c82f300051cd2c30e8

    SHA1

    885a429bc455eef49b5362237bea73178ca1aa18

    SHA256

    d0a9b9a96acbf653cbaca5ae6459d0c520533b6263c76ef7543b61d39cc1b42d

    SHA512

    fc45cf0ea8d314b48423ff0f894292157445e80cdad34c2f35caa53baa5b0214d81a3252d5af7ed18db1e12d33955b307e1b23d39118ba1dab07cd64776a364c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    70KB

    MD5

    0207ac7edef11ff48b539af41c4a3679

    SHA1

    e997b55a3ece2aad51d16498e3f3ab0b7e4af77b

    SHA256

    400a84dff6dcc18ae9924af69aaa14b087a4ada280ea1c5adf32fc589684ce08

    SHA512

    3473d76c943dfb471372cc11d15a09ae22a995acb9ff750a03d0ab109f0472ca072e5d801be23bfd4eb924388843fc51550da65203fc2849566dc1de266cad63

  • memory/2772-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2772-658-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB