Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 03:28

General

  • Target

    c36a7a2d2cf097095722dd6651788130N.exe

  • Size

    45KB

  • MD5

    c36a7a2d2cf097095722dd6651788130

  • SHA1

    7c51f7cfda0efbf949e90c1d37abec7267f75817

  • SHA256

    451919166382da39c350bbad714e016d2aca896160766fb3270f49c623aa81d5

  • SHA512

    a545bc7d1573fcfccf8b64ef3a39f7b6245f8356d4b0eb6526d67c8ac61fcd078ab86b024930572e8235202855ce58f1e0118566c1d1a149d26437bfce1ecf7a

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLuY2Z0Z3:W7ZppApBULcfpHLcfpyDXYF

Score
9/10

Malware Config

Signatures

  • Renames multiple (3236) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c36a7a2d2cf097095722dd6651788130N.exe
    "C:\Users\Admin\AppData\Local\Temp\c36a7a2d2cf097095722dd6651788130N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    ebedd23a0f4c537f92b5d4cacb1345d9

    SHA1

    20b5239eaaadb47da4c39959fa165a90ae15accb

    SHA256

    f5fde0ebd9babb0637001d75677070b4fda02c407c5ad290820aad4d8072741d

    SHA512

    49d6d1cd318e92c97bbde828ccc2f2f0edba88457ef28aeff083b5cccc2e35e60a2f5fbfaa9b21a17cfa5d01b702f8cbadd8773959d2f9b026404a1ccfa7a3ac

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    6cbd0c8af5c467fbc7886ac6541f49d7

    SHA1

    a4369adb76987025b91677d80baaff07a1afebe6

    SHA256

    5b0ac0175e40d28a783643c1b36cfd01b8e79ecf2cd87683a9a8172b78985e58

    SHA512

    d11ebc1f2e3c6180f51ff72ef6d44d1f7b06204bf6cc64d32dc70d9954f7fa2b7405cfb9c2f0e76dae21828e07123992b20c08d2c84a8a7232ea3a044a8ae9db