Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 14:34

General

  • Target

    10b0e6c0dbf1cc72c4f9abece2e2f650N.exe

  • Size

    68KB

  • MD5

    10b0e6c0dbf1cc72c4f9abece2e2f650

  • SHA1

    0cdc3c4923ac1c26f06e8d9f629a568886d240a4

  • SHA256

    dafba00033eaa93371b992a40d992ee2b732b86f8a76a16f06b7fa0d149fb9ef

  • SHA512

    df9b87b4227169eb566a8397565dfa1aaacd129053dd44afe75849d3ddc4180266cf1c53f2710d17928fa30f9a8fe7efbb2b353eecbee338dc05c88c7552fd58

  • SSDEEP

    768:W7BlpDpARFbhYQkQzaxkd+axkdo176/hvYaJaMGw4PCs2B24PCs2BHE4JAIAepEK:W7ZDpApYbVK4vx4PN54PN4OHepOHeZSi

Score
9/10

Malware Config

Signatures

  • Renames multiple (3156) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\10b0e6c0dbf1cc72c4f9abece2e2f650N.exe
    "C:\Users\Admin\AppData\Local\Temp\10b0e6c0dbf1cc72c4f9abece2e2f650N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    b1be7e2837f2311f33c9ce53df7aaacc

    SHA1

    60aee670f447f714ca2968ad0809e0770c2264a4

    SHA256

    f68554acf577343fba97368c0de3929c303266a5fd6764685ce1d52b0be0f01e

    SHA512

    19ea763f06c63a89541faa930c32bf27b04dee75ce00607ff36a37f64146e869d2bf8072e7ca22097a69227e36a5b5b7881528f3873194dbd86f99c5af6a42bb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    77KB

    MD5

    d3eb07b536a6541ccefcb0076271ecf7

    SHA1

    14ea432fb461a16a3708c8809b71818bf96ee5b6

    SHA256

    4d10b4a204b15ee8517d63bf42c691e07b6534e47761467080651ae81d9e8db5

    SHA512

    31b3902069ae4011e9b4d0afb5deb850588932f6c2a941677c989336a8f1511fe311337868bd6fd7bd8e719e30bf8549cc3ebeebd9ce96413d70e680d3af3bfb