Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

19/08/2024, 01:17

240819-bnc4rswcqg 9

19/08/2024, 01:14

240819-blngqaygpm 9

19/08/2024, 01:10

240819-bjw13swaqc 9

Analysis

  • max time kernel
    120s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 01:10

General

  • Target

    4b314081bcb5531e368729bd169b6520N.exe

  • Size

    76KB

  • MD5

    4b314081bcb5531e368729bd169b6520

  • SHA1

    26a334cba2d2873df0fd811dba841622208af408

  • SHA256

    5483aadefaa81c09f0fe892527ff0003aadf557f64a0fcf5486618e80130abfe

  • SHA512

    3a390a26faade5c9b2efb19dba187941ed28faba4b3ae74513ef27a7f68f4a3a756e7a0459072834ddd53869bcf5dcc58e042a685e71171ed50bdfd56466274c

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPfFpsJcFfFpsJcC+3mC+3meDAfABJ6fABJwEXBwzEd:/7ZQpApze+eJfFpsJOfFpsJ5DL

Score
9/10

Malware Config

Signatures

  • Renames multiple (3121) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b314081bcb5531e368729bd169b6520N.exe
    "C:\Users\Admin\AppData\Local\Temp\4b314081bcb5531e368729bd169b6520N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    99cc6b150dc712f170047288088b07b0

    SHA1

    080d74ed48b2f4f00aebdd978d57b8750bc70f40

    SHA256

    0a464a8d13e4aafc907a2d97ae898012c49ea5c7b059600ff3d763a9208a589e

    SHA512

    a89b55cc7daa215a6251ca9c72edd90e4e789ea17c95c715be8dc7c30f876f891f504b5875853d146afe2799d45c992bf803c5e9ffe5fe5db114c149f1291907

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    85KB

    MD5

    74027ddb44c97df137a763cff5dc1e87

    SHA1

    b0d30e40554fff05c3be1f091b58aa37f50646a4

    SHA256

    7cfa39986c9d5ecac90e7f7d2874f07fc8049f31a66c379a7f657fca87de9316

    SHA512

    1d2add070583c49202c26ed94b26dc8d130173c8ca98096945269674e45643a21a4ff49f175e3655dee7a742da06f53c6e3c72f50562664b6cc8eb68c3ffe7ff

  • memory/1308-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1308-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB