Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 08:36

General

  • Target

    f761581b7d46004780711d50153f9c10N.exe

  • Size

    43KB

  • MD5

    f761581b7d46004780711d50153f9c10

  • SHA1

    5bcce092bbcf124c934bf0138698e164e53f1335

  • SHA256

    0ef7c5bced76dac22162cae32eb81bfcb4611d4cc777e0f8585d9cce4f55fbc6

  • SHA512

    2fd8dbcc07822baeb03d155fac61153071da0f661f81854e24f956633e9b656c2a088d833065fa4d4fde85600ad888b6c3f7c3361171b8381c8982f107149d96

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOHwOoJVO7iJKqOxiJRDOWiJ4JOAiJ/rOqiJv:W7ZhA7pApM21LOA1LO2c6b25gc6b25up

Score
9/10

Malware Config

Signatures

  • Renames multiple (3119) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f761581b7d46004780711d50153f9c10N.exe
    "C:\Users\Admin\AppData\Local\Temp\f761581b7d46004780711d50153f9c10N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    83c5a1472e18cfaeb44a195bb3ab528b

    SHA1

    0fedb006b64e3d0c2e8d6ae2bd1249f62fd5639f

    SHA256

    7ef17d6909a609363257141af76d41e9f57b89ae71af67c62350a1aba5a8cc04

    SHA512

    5783926753b53dc23a394d7871c8ece0e5689b173f4da1b9467ec97bba1eee6158b04ae8f45fbcef49d6dd2c8ace98dcc3177a2ffea031e2315de7b1246038f7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    fd801de870626451c37bed29c1203030

    SHA1

    6c65a7ac1b22597162b11f9633f8ff8eef393c14

    SHA256

    29685bd597c681eba229c255d186125b54c4668f6f074d91b17f4142fd026055

    SHA512

    49aded37e8ce350363700eaaeb24d3d64638fc89425b06ec5ccc80188335427ae8b89f2db27e1b73e124db77fa0b4dc8c1159b0c1432852db9b275464a8fcd54