Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 18:52

General

  • Target

    0dc32e4bc21889b31524f1d7435e56c50f8810311c63b409e92c2d0cf50497bd.exe

  • Size

    40KB

  • MD5

    ac6ac8773bdd9989af87ee6299deba8a

  • SHA1

    cdb175ae740c7c0bd9d52d0839bc4346a5405e13

  • SHA256

    0dc32e4bc21889b31524f1d7435e56c50f8810311c63b409e92c2d0cf50497bd

  • SHA512

    9659088494fc815265b91632bd3c0fe16c9b7c77973928b5323b559affa0f9573369375a82a6ceba3cdfe4e2348a5b4209bd1c20ba447c56e708196b19ffa186

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LObC8p8USd:W7ZhA7pApM21LOA1LOJSd

Score
9/10

Malware Config

Signatures

  • Renames multiple (4115) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dc32e4bc21889b31524f1d7435e56c50f8810311c63b409e92c2d0cf50497bd.exe
    "C:\Users\Admin\AppData\Local\Temp\0dc32e4bc21889b31524f1d7435e56c50f8810311c63b409e92c2d0cf50497bd.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    faa4913ac2128471d44ceada488ffa5b

    SHA1

    09252da352073f5708086147cce8f9140bee0d8c

    SHA256

    9b028c19a83e8838e214e48383d93a8881478bb64981a6e06fb79c0906628c0a

    SHA512

    7da2c028a1fdf3c5d0d4eecea28eb16c857b2d6426a12c233b92c25e594429ee096892004d6f2c5053688fac6b5a09b56b60c4e6da93f41ea4899b3e06637de3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    2dd3cc2a6183ed4d40aa4c1daa22ea97

    SHA1

    63e0dbb1127e557b51d977d5c618b379a3c096d8

    SHA256

    8ac60fa8dadbb86825b2907eceda1286f816d38d6ec2f3dcfaa6e602a612cefe

    SHA512

    5d31d1f7422b8eb3d14fbbeff2753773e7a38d61983d5d248d7d8a270dc547d22448d4b1a2728e074a17a5017798f484bb99ccfda2505452837ad9dcbe4d511b