Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 08:49

General

  • Target

    672b7133a313afd9ec5178569a8bb170N.exe

  • Size

    75KB

  • MD5

    672b7133a313afd9ec5178569a8bb170

  • SHA1

    9ba858230c3e0df0bd652767bff92da8f0a7fd4b

  • SHA256

    81b2ee8ad7826f1ac7fa1a9d4367a32a0c73fe2fb01d0930401d85e41f0cbaf0

  • SHA512

    8fcd63471bd3b57759e574f5776ce3fbcca200e63dba2a098e059bce1092403cf327cbfecf3d88efa90df9a9275829912b9e0630c80824ebf14eadfcc1535a77

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJ5DVSWu0SWut:9QWpze+eJfFpsJOfFpsJ5DVSWu0SWut

Score
9/10

Malware Config

Signatures

  • Renames multiple (3109) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\672b7133a313afd9ec5178569a8bb170N.exe
    "C:\Users\Admin\AppData\Local\Temp\672b7133a313afd9ec5178569a8bb170N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    38cabdf587e9babf396b20ddce4af279

    SHA1

    2fabe87d1dca52a9a17794b7a775888faa4d3b23

    SHA256

    808dae9e8411bd380ba3cffcf7b08aa63c1cb00befed18b8771bc3c2a8531da7

    SHA512

    0dee57a4be722626359206fb98e76a8463bf24f291feb24a11543422e9e6bb418d169cc9d0aa7a7bc0561ed3860500ffa18fb526633f90fa23c1713ea8c072fb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    84KB

    MD5

    2a4ded3d4df518a73c6ef81f4e5a6247

    SHA1

    161e8d320e4692939965e766d0937f2f157f8303

    SHA256

    e60dc33a262ea10e5edfce264911be92339ecd982607b9fb2ad265dab12ca29d

    SHA512

    44219765458a1fff2a39a612e5615b5ea65ac4305467cbc97981d2bc637b9b1b4703a12adbb92f82a3003088d8dda8914305b9ebe096c832fb6986999885baa4

  • memory/1172-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1172-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB