Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 13:31

General

  • Target

    9ec260e2b07c0f40983b84db4fefa0e0N.exe

  • Size

    37KB

  • MD5

    9ec260e2b07c0f40983b84db4fefa0e0

  • SHA1

    d5b3039b79cd04971a1ab8660d636c5426a142bc

  • SHA256

    d9d150158cfc352154e2bfc67976935736f960ffdd94cd094a625f75b961bcda

  • SHA512

    03d81845219cc69f203766f66e6b9cea511be661f9679c7c2c88c2f5fb60ccdd088ea6775e0b700bd401a407cdb2f5e1da11e09cec8216b97d2ba18df2fd35ef

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lsSz2:W7ZhA7pApM21LOA1LOl6vSz2

Score
9/10

Malware Config

Signatures

  • Renames multiple (3364) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ec260e2b07c0f40983b84db4fefa0e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\9ec260e2b07c0f40983b84db4fefa0e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    ac92103cb1757e904c8bfdb1edae42bd

    SHA1

    a8988cae963b67363e9d6af5b209d3ccfdfda826

    SHA256

    d8e7c8c92e68ca5a6dd45d3c3eff71f1ed33768883031f498e6a879a5d7a5bc5

    SHA512

    8b111133774c451e10bbd88f6ec7b3f52789c6c1425130b970df94dfba2796c9593815a5dae6bdb40d3b2aac94a408be6357b91d614da98b2c76b8bd6e7ff80d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    46KB

    MD5

    781e36ce26fd4b0b9e5ac2390e0186b6

    SHA1

    3aa4d2edf844c8fda9e47761a1aa57599dc70d2c

    SHA256

    fb0fbd54b86ac8a25d88346fecc6977b56c169aa88b6d5856345e2b3ef8858e0

    SHA512

    e6c36f6468f5f8f20e0bbc6d2598e6e58dffad5107f882ce2e8f0536be5073aae78a384a4e637eb98983273f76c34ad9e8c786225bd5d15cae3dbbc0c0190791