Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 21:42

General

  • Target

    f5c2540f4ed94aec0aa1a9f561e52e30N.exe

  • Size

    49KB

  • MD5

    f5c2540f4ed94aec0aa1a9f561e52e30

  • SHA1

    86439d8ebdf1756928f88f953630d3f9259f444b

  • SHA256

    4858cc5025b20959b1ecd8277433dc171cdcd19ca3dbe5cc9e90606cd3e614f9

  • SHA512

    ae763835ca5c5943fa953485636e9a2c7668147a7aaa1f4c05d17bcfb020498386a439b73c3e3629f70cf5c7b12edda11cd81c2c7ac233ffabef0c1245806fee

  • SSDEEP

    384:GBt7Br5xjL9A7AgA71Fbhvnqj7jU7ubTAgpbuvx10AaIdKB7ubTAgpbuvx10AaIw:W7BlphA7pARFbhL801VvM801Vvv7cYy

Score
9/10

Malware Config

Signatures

  • Renames multiple (3229) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5c2540f4ed94aec0aa1a9f561e52e30N.exe
    "C:\Users\Admin\AppData\Local\Temp\f5c2540f4ed94aec0aa1a9f561e52e30N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    4566cdae4b9c82d360d488aeae7639a1

    SHA1

    0287eab060d4515eb0c31aa557265a5124e3a438

    SHA256

    9bd401d4da2f08c170ff6da041fa957ad3f415719082e4d9fc564f5e43b3ae17

    SHA512

    1fa99ca6c44ba8101299d0b68f2e01e38893306bf0bf4537eb4a1c13f29d1cc18adcb833753f6e031a08ef1eea300ae1e58de6d1903c8bfbf2d9e4ee14a0a9c1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    704aafa0469a9521f74509868dc6a2ff

    SHA1

    dd828176cf184b9133e890038cb96efe3f44178c

    SHA256

    a94a3dca3f39951c262735f88056d137bd875862733ec6d560a2ab9854360245

    SHA512

    a442efb2b21e518d726bd71ec0a173be6dba17b22f4112fb9bd6f366207484c7cff91e21baa8cb2cebc6bdfa1bd3ff6de88bd4501da80dbd1e9524d806a20c53