Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 18:40 UTC

General

  • Target

    82a620f5b49347b05c42f36f3a62d580N.exe

  • Size

    94KB

  • MD5

    82a620f5b49347b05c42f36f3a62d580

  • SHA1

    3199a2be46a01568d82a63e95e5c2afdea79ff1c

  • SHA256

    26870c6084ac096243f219778d506884a53a2952e48ad119222e45b9dafeaf21

  • SHA512

    93c0c2b4be6c0a689060c716eda5da8f9ea04820708923dddf554d7a9a024b8fd2315fd76fa631c4c4351cfcabb96f0a761976e99e31b11cefc31f27168a9ecc

  • SSDEEP

    1536:W7ZhA7pApH9QHwtRF9ESWu0SWujodsodaNovTW+SPL+cycWAF689ilYp/Dop/DG:6e7WpHIyRF9ESWu0SWujKsKRsP9fVL9f

Score
9/10

Malware Config

Signatures

  • Renames multiple (2876) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\82a620f5b49347b05c42f36f3a62d580N.exe
    "C:\Users\Admin\AppData\Local\Temp\82a620f5b49347b05c42f36f3a62d580N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    95KB

    MD5

    698093958e35a73597d3823f8ac64326

    SHA1

    0492f2be839cdb7bc095f62753b0d0eb6ea53762

    SHA256

    3d99e9cc04c27e7eb2c8cbf0fa302d4b548d0fa9401e348256261599a0d3cfdf

    SHA512

    19e3f2b6d28d447c4bbc08fa2d5807ab195edd9c3aed0ae7ccac905f55642567c44bddbc0692dc30722a112445334ec584da015b6390c1d1ff4c300040d53ac8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    104KB

    MD5

    5c3673a46887902ed5ef75f6e5769b08

    SHA1

    e11454cd47237064951a367e8ef17d2bf1840bfc

    SHA256

    f7a8b14bfcd7117f638c32f3f915ebe4d27e1713a9102169678977ee960971bf

    SHA512

    0cbe7ccadeb2725a663597237ecb4113fcbe9de5f6d9f391b2422edb46185e4af337ec0806fb68429b0c1a50b28a98393ff54e020aee953b73004371fcdc920e

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.