Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 05:05

General

  • Target

    61e3ae29d5bdce616232cb8a63005d50N.exe

  • Size

    89KB

  • MD5

    61e3ae29d5bdce616232cb8a63005d50

  • SHA1

    91dbfa631f9e3957ab8bbb2809b8d5ed60464a9b

  • SHA256

    f5ee4f40f307c450f03b807412abc0ea13488db33ffde70d06b2363f91308bb6

  • SHA512

    af2142f00ad6b21884d500dd9c5aed893070ae8de2d9184c915d25e76298aee8f373920aa54a91ca2b00abc860cf2cef1a6aee1fcde3c3b1794d7b94a6e1cc3e

  • SSDEEP

    1536:W7ZppApUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFsAcEhL:6pWpUFpEhLfyBtPf50FWkFpPDze/qFse

Score
9/10

Malware Config

Signatures

  • Renames multiple (3148) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\61e3ae29d5bdce616232cb8a63005d50N.exe
    "C:\Users\Admin\AppData\Local\Temp\61e3ae29d5bdce616232cb8a63005d50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    e695733b765204660323e1bddd0449b0

    SHA1

    acfe5d4c1b86fcce9806e915c46b99415c32d37f

    SHA256

    170f7e61bdbeaa24e6fb91da78240e1405e2c9f700201d00db5bceb50a129fb2

    SHA512

    bbb16b777b06f4a05f8cff9ef8fffc2fe7f649f004af6d1d7ab9cdcb350010b4aa62d917b7ffe3670e249e8116faa6105c39a0f398f587b4a01ba3c492556536

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    99KB

    MD5

    3467dc73295e46871524ca753f279782

    SHA1

    88cb215894f20b73f67f8aac52598610d993c089

    SHA256

    9eccee35be3ed62d3581d761a529f04d7ac79784e6ea2b4f4643cb0187d40f3e

    SHA512

    aa6bdc1a5b15ae6b1224e4167e3794438c71795b84fd38f4df88f29aaed21eddf940dadda12703a9bc5f939f85083a78b9c814b32a2367f0de0287064bd3e838