Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 23:50

General

  • Target

    a5ade10f8bd44bbee63d8f074b037eb0N.exe

  • Size

    132KB

  • MD5

    a5ade10f8bd44bbee63d8f074b037eb0

  • SHA1

    57d6fda97c745f6f15c3226aa825c7058150b84e

  • SHA256

    2c32a0ac134ec6f21652f34ffdb32c82ffff6c8e5ee43c584f524e8152e447b8

  • SHA512

    d1a1d58e40e4eb1ae96ac0f89af3b601680d5787bf1118af8db0d54c96f95d4728ca00472ff3547239925a17dad2aee1df8f7d7cd354da18dd6edf93c1f7719f

  • SSDEEP

    1536:W7ZhA7dAZ1++PJHJXA/OsIZfzc3/Q8zxY55TWn1++PJHJXA/OsIZfzc3/Q8zxY5x:6e76mQSox59QSox5mAB

Score
9/10

Malware Config

Signatures

  • Renames multiple (2840) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5ade10f8bd44bbee63d8f074b037eb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a5ade10f8bd44bbee63d8f074b037eb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    132KB

    MD5

    00694f36cfd6b5fa6d543c4ea1b20c85

    SHA1

    c531743fddbb7110e91701bad9e5b31b2a7952a6

    SHA256

    53072aaa12ef372be42ae0efd1dc22cf003789fbf59c3de2e104e3e5b11439b7

    SHA512

    b50f526af681cada0e05a8ad678cd98a33759c28c563e4b435d7808d0f242f15612cca43f9b6288d10d45dd99a6f7a98f031ad8fc11a915e2289876489eb53c5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    141KB

    MD5

    bfe3e845ec38bd7ee30810aae17dcb6d

    SHA1

    dcf8c20faf330ce5fb851ccaf7311fd710510c92

    SHA256

    592e917b16d88412009079d82aa4338dc17b3390eea1f76f9aaa810f236ada8b

    SHA512

    9d818948bf230fc8352c57fc4ddfe027fb96acce3c1f99a1fcebed489fc124fd0e30373681b0a04ff17fa6dff885bd5ec30f6e702767b849b4704c183e152f6e