Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 13:54

General

  • Target

    9449bff502591593ea49f197683250b0N.exe

  • Size

    38KB

  • MD5

    9449bff502591593ea49f197683250b0

  • SHA1

    a7bac343514b2bf3732ace91dc49fb261cbe9b37

  • SHA256

    d8dd46a8db97f8525e52b354fa325d6f7b2074688e61dfe06642b01839975082

  • SHA512

    a7c76c8f81d7f3e61aea84b8bc88d595c13f4fdf829dc80f25ad9973f7a50fc3a992008890ab9a354c0fd940ea8ec828aa7e0b066406049e7c820cf470cf0638

  • SSDEEP

    768:W7BlpppARFbhknrzzA8JQ2AdJCzA8JQ2AdJWX0kXX0k8z:W7ZppApkGpJz

Score
9/10

Malware Config

Signatures

  • Renames multiple (3454) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9449bff502591593ea49f197683250b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\9449bff502591593ea49f197683250b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    0827256358b9f0186c3f59bef0a06c03

    SHA1

    8686c2aeb7eeb4c31ce98d80ba14e8604ee26b7b

    SHA256

    4e0cb4e58ba5f7da0668ce3d397f3c0d0dca6d581f3751a1e12ac8600bb1256e

    SHA512

    ad28a535e0c5f61d0c9b1783d75dff8c8b14331a70ad0c99ee9a2c661e9e8e04478a05fdedbf77da6a0d93b6a9d03deab1aa1d84a59e8afb28cba1a3fdf635ad

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    c2a5d4618d4e3bdb48d463193ac72bd8

    SHA1

    3cf4afbcea9b37dba8632446d93d84df75981f9f

    SHA256

    a694c327b79e72c39fe64b636663af11051e9b81ebfcac0375a5c3ee16007a69

    SHA512

    76b2a4161f7081249c9dd7d564e06f612e696380a48f36a72acc94b42a30a66778696004cabf9284ff4d829787d1c9e1436eeecc22d5b34fd0d9c631de1ed048