Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 22:58

General

  • Target

    7e7d8258c892f4e0fd5578b033567e20N.exe

  • Size

    204KB

  • MD5

    7e7d8258c892f4e0fd5578b033567e20

  • SHA1

    e399e1e7926aea6032d3f3e0bfa2d0e11adc2450

  • SHA256

    6cb4757c063db4636535a82f7cc41d7871e4019f949d2139377127e651801f53

  • SHA512

    7911098f298cc352bd2aa4776337ce270849c3904647bd062c1f4eb8d5d00b25ac7f4d86432222e868c67f25c1602d7d1d027ace56b655cfe02fbb942e6a98be

  • SSDEEP

    3072:6e7WpMNca3rytOkWpXfnYRl2l/9HSFHzJ0lBJTzky:RqKB+tOkWKR0iJ0lTzky

Score
9/10

Malware Config

Signatures

  • Renames multiple (2681) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e7d8258c892f4e0fd5578b033567e20N.exe
    "C:\Users\Admin\AppData\Local\Temp\7e7d8258c892f4e0fd5578b033567e20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    204KB

    MD5

    2ea79416062c77bc8dd2a1d38b25c7cf

    SHA1

    329314c008a31f4a0170f251315aa27c86d37d96

    SHA256

    34862dfc1dd78367e962d289b0c1c34637572846414e12f1ce6ea11ba9345251

    SHA512

    fb43e7a6f0f425e3f0c7b7b6fb6a1256e4b3b9c318779c5cf93eb3e6de832e36c927f287242eea6e91b31c6940e52bdc6535d0f4612ee2519fc571ccb5cb5d5e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    213KB

    MD5

    e426ce0ff4d8a3819213975dbcf2abf6

    SHA1

    af998f3e762dbaea32ac8d47f4c8ca939e497b2c

    SHA256

    4c8ae5bf6a183c90bc1a8acafdae549c51bc921bb091965fa356b3d7aa87d405

    SHA512

    634c7a82a5cf00b664672d9fbb4c5705fdf45e3fb5ee5788368d0f013c7a81e052982addc55ea5cabd35667a445794872d007831e47f6f68f94d27f19eedb830