Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 09:52

General

  • Target

    a3d7cee7f8723c4861d4e86242569c80N.exe

  • Size

    39KB

  • MD5

    a3d7cee7f8723c4861d4e86242569c80

  • SHA1

    acd49647fff37ed77c459b632dddc2ac1b9de523

  • SHA256

    3c4d794ddb5a643f68d56b339480048a9d3c4d517797f25a6a3fcf949f6d1609

  • SHA512

    883d24a4c0fdb916af66064012b9709f6876ec0a90782b995e114f8a7d66994ccd07f71164bd2cc3491d9c8d615ad46dd0db2254df763de222b0b28c10b24788

  • SSDEEP

    768:W7BlpppARFbhknrzzA8JQ2AdJCzA8JQ2AdJWX0kXX0k8Do72OiUJfo72OiUJt:W7ZppApkGpJwoB

Score
9/10

Malware Config

Signatures

  • Renames multiple (3452) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3d7cee7f8723c4861d4e86242569c80N.exe
    "C:\Users\Admin\AppData\Local\Temp\a3d7cee7f8723c4861d4e86242569c80N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    316f983c0bc1782a0f12ef5eaa0e2d63

    SHA1

    b3578d00279b53fc02b72e3d86e70733b8071a18

    SHA256

    c22283c23dc9e657d5387e27df095d22a129245072ef08e1bf78fe27c4ad6d75

    SHA512

    bfa0db53fd1def29635d1032e77d7739eccf811e6cc5d6eac5f9e4c8cd6fab77a95057f3b93d5110bcacf2a6670bb9990983999462ba3d4bf36983045982372e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    4d9ccde0d9f0e82e595a42655d2adcba

    SHA1

    535331ac84335826fcde3167da1d47c57085cb87

    SHA256

    0ee274eb0d30d32ca41f3ad96b84707c840861feec36151bd8afc17697fa5b18

    SHA512

    d6e083c8750b519a60e5e80416a222388c7ef35aa7e2cfe47f662caea3b912648d2dbae8a1ea3fd75c3e1a4552470471cf4bbea65d90cce183c278a8d488f5eb