Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 19:17

General

  • Target

    cfc59e367bd1643953f6cf9b11cdd980N.exe

  • Size

    46KB

  • MD5

    cfc59e367bd1643953f6cf9b11cdd980

  • SHA1

    c43b213601307591bcf716384f79a864bb7a39a1

  • SHA256

    b4643df6606f1e4fc0156e04d8221badf25ac060b6f8f39cd7e75d75052b2202

  • SHA512

    69b04b801f5e8f9c251824087c530bf55662cc1aaa4b4b76d0c637b3cfe195e8e1ab0977f5b97b13e4b190fbda2f1abf8ffadfd3488de48ed1a17a5fdee3a4b3

  • SSDEEP

    768:W7BlphA7pARFbhL801VvM801VvcR2+lJtZ2+lJtSsM:W7ZhA7pApw03vR03vcltdtSsM

Score
9/10

Malware Config

Signatures

  • Renames multiple (3289) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfc59e367bd1643953f6cf9b11cdd980N.exe
    "C:\Users\Admin\AppData\Local\Temp\cfc59e367bd1643953f6cf9b11cdd980N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    8cfc8f0801f40030c4c6b96e8289d8b7

    SHA1

    7426024f3f0c9f492940068d5bb039464217aa85

    SHA256

    00182a27b9f319f5df8c99882abb9627c119e339c3d9d75ca409717254d7e780

    SHA512

    23e6b46230055747016399c5a33cfeaaf7473a328584503705cd4a87dc36b817b891874058609cbc92cec7ca5f6180b143577a3809db24883b1c8d40d0a1f6dd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    47fd1713db3eb7a208874ac28eaf43f4

    SHA1

    a3e89dec7bde99d6939c689dad5499922a688c02

    SHA256

    a501d69adfd66e9315565421c68b67be45a7d8924a50b5cf8c6ac397f9e290ba

    SHA512

    0b2d2bf471dc60685b524e1964fdb6a04a4ef761e22e705c1edad338ef40ea73935e414b3f82d5b75abba7d1e09b7a871e090a8b86bf4494e579fc62d6bfe73c