Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 23:04

General

  • Target

    96dfcf90cec10dd308cb7b8a8d07c2c0N.exe

  • Size

    48KB

  • MD5

    96dfcf90cec10dd308cb7b8a8d07c2c0

  • SHA1

    c0b22afeea10c2a5da1236424e211d39b9780146

  • SHA256

    daac4c54030113f4e5c60fd0bddfb440927285316b0c9d4de6728637a6e2cdbb

  • SHA512

    d4fd15f917e07798d88dd184989b9495c1bd8343d830bb5dcc1564ba92024d0a933a2810da5692e861af2c7e65c3df8fc0bbf0b95f4bd69e47b5cd89dd3f55b4

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/Fzzwz72Jwuq2JwuR0U0Iu2U2xhYChYn:/7BlpQpARFbhNIiJwsJwwnZrhY

Score
9/10

Malware Config

Signatures

  • Renames multiple (3354) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\96dfcf90cec10dd308cb7b8a8d07c2c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\96dfcf90cec10dd308cb7b8a8d07c2c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    1c4a7714b071711e076dcba4b2ac4ba0

    SHA1

    84aa1f67fa53300b856c302a76311d00e66d7875

    SHA256

    22c109b3b9c5fd0888259d6a0ffd5636d82269265886e49045b20cec7a5b66ff

    SHA512

    1059ce7aba0e786053b7c968037967678f665e9740da990e07fbd21e3b1faa5e6d0f6adf86e1ed0c09617a1305ef7b85a1677b98afef964a86bf4365b14701fd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    f8c06ce9049be827351ce691d8896894

    SHA1

    4c4c71b08bfaed9058d5ebcd61afed0d23a88ae5

    SHA256

    bc4bbd4b840a219656c737f2f976a969c8a0c2e786f0760d920d0c76c4983e62

    SHA512

    0031a0993c56ed4f9703e9912d371e4bcff1c916644cd494e73aa679b258bee22b8997b4098c47c32058a9d5116fcaab171b44d5a81ecf09a0f96332f7cc2b36

  • memory/1736-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1736-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB