Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 12:50

General

  • Target

    7521efffec73b2ff04ead308ef025020N.exe

  • Size

    54KB

  • MD5

    7521efffec73b2ff04ead308ef025020

  • SHA1

    5e5c9124d6675114dc704df701531326e03ca7f1

  • SHA256

    9d56589ac10d0410ed2ef42bd7ecc5094a120e88fb81a9b018ec482577ccb8c6

  • SHA512

    41b7174988829e9df8bc98319237e837dbb7f0a3fc1ba1123527c18cc350abb23965a6d565880f9ce9dd9a211c528bacc79461faec4b3e968315816703de4e67

  • SSDEEP

    768:W7BlphA7pARFbhL801VvM801Vvv7+jLni+C+L:W7ZhA7pApw03vR03vCni+C+L

Score
9/10

Malware Config

Signatures

  • Renames multiple (3193) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7521efffec73b2ff04ead308ef025020N.exe
    "C:\Users\Admin\AppData\Local\Temp\7521efffec73b2ff04ead308ef025020N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    9d4a50273e05018904af1f0bb9b6d6ce

    SHA1

    40ce43e5f362973a82e9ffc4e42cb690cee03b6f

    SHA256

    43ad164a343b8b5ee42dcced6b32cfd667acb5781fdb0f12196670f71437cf5e

    SHA512

    0a635a69c6d27c913d5650779b9090b742072f0a1bc79e988c0cc590f9279c09b56371abe228f74e40cfef180d819fd67d0922dffd61b5562bc2b03344edc7e3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    232bc82ab5076faca3220d7e0f8574c3

    SHA1

    ad35d450a9e69c6619340ed538f03ffb9e722b56

    SHA256

    34a3e056e45c066f277aada8435d5e0e101325bc7afe0becf31c0bc2f991ce65

    SHA512

    d053571abeb03a32349813e0559851848b37ebebb371a83659329b705ea2de8d96ae7746f53ab1c3726abebe9de10752df8175f338a8b27c658bbf8cd0cc9ff7