Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 19:21

General

  • Target

    e28359b6db4e9d392b5d87fa7785a210N.exe

  • Size

    43KB

  • MD5

    e28359b6db4e9d392b5d87fa7785a210

  • SHA1

    2ef70d108b7853679b799fb859b5fda9a33841fa

  • SHA256

    3c8a47d07c42227c38abfcf71925bfa35e290b0c104a21772742774b102eaebf

  • SHA512

    7ae8ba998eed916b96356fe3b4c0b0a1faba3b772f2fe4d2e0e3762bb763e521d1800848e10edeff4b1d89920907696e53cd3e9898b557b601b85ff339fc26f8

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzHqK66CPK66CR262X:/7BlpQpARFbhNI3NCSNCRhs

Score
9/10

Malware Config

Signatures

  • Renames multiple (3261) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e28359b6db4e9d392b5d87fa7785a210N.exe
    "C:\Users\Admin\AppData\Local\Temp\e28359b6db4e9d392b5d87fa7785a210N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    d51e89c938dedbd3ef883bfd102a61f8

    SHA1

    9aed1fc7c3276fb27cf5d32d234cd52a0ed8f507

    SHA256

    cfd65f9daf81b7111bae154bf0d9898ba9676a8fa0c64aaac40285bbbc018b59

    SHA512

    225649f027d88c006ae8506c214df455f8339622df5f4381c4aef22345a0528fa3142d89577a05fffccd5f4d6ddfa1ee272d28fb081e5f85a8292c465fe4be62

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    fb051aa629a459a8d07d527fe5483752

    SHA1

    672843e098d118e543a501bdd7ed497ff05ff1f2

    SHA256

    189c8e9b91fa1c3140651c62564c7c70afc1c63686263b27fc486ca3cfb98b08

    SHA512

    58e7368816cdd6ffc1e3c4aa8f16ca50a279213905b08b034c51e795255cb163b30956e5fcedd35f5dce137067fa7e12eaa9389186157b610f7c1a0225617f9c

  • memory/1928-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1928-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB