Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 08:26

General

  • Target

    55f4052b71794b2ef7e86a6d2542c090N.exe

  • Size

    35KB

  • MD5

    55f4052b71794b2ef7e86a6d2542c090

  • SHA1

    42501f81f7620f1f6851f78c918526daabceb69d

  • SHA256

    45dbb4153d0fec11e38930ea826616ab1dd005dc4ad074c7e6c5b2428c6b0d7b

  • SHA512

    8dcf4b359cf2103143ff375ed9e441882bf2198248c9e23bed0eeb8f210ba9f4ba761e4abd5b2550926c5549beaebc15855ae3c0faed5bdae1de5cb4dd5dabf1

  • SSDEEP

    384:GBt7Br5xjL9AgA71Fbhv7bhv3KueKudLl++KKdXd/Qy:W7BlpppARFbhjbhPKueKudLw1KN3

Score
9/10

Malware Config

Signatures

  • Renames multiple (3434) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\55f4052b71794b2ef7e86a6d2542c090N.exe
    "C:\Users\Admin\AppData\Local\Temp\55f4052b71794b2ef7e86a6d2542c090N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    35KB

    MD5

    3f4236e842ad4aeafae02482085264c0

    SHA1

    065f1685786c47103848fa4f131a329396e88cc7

    SHA256

    24eec6a68e1c589951fd799f63b66043d8e2a1712a655fce9c71a194d4666dca

    SHA512

    0e6a185eeed9cdaca7eee3227ee58c0ae1e3efa652b955639a7f0658274631ffbb7baa28ca2a752a0e8d4cad11037b293a16cf0c9f8580eb666295cabba753c6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    44KB

    MD5

    2eb579b21c502eb18aae409b8b59a470

    SHA1

    eef73006c27b2d72cb853784fd6fbb161ba233a2

    SHA256

    c7eff43109d05a0d37121b1db7de1f315f709cb75888a718aab3acb254b49931

    SHA512

    95f6f23e0d78a8e0f0e1c0c6c28935102269a711f1b2d1162899e3d1d956fb0c37c4220651beefbd77ec654a4a4720f724bb87e64ae94215300b265d1a5ff7cd