Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 20:04

General

  • Target

    96fe929ee89a51b3a659751b37bee6d0N.exe

  • Size

    71KB

  • MD5

    96fe929ee89a51b3a659751b37bee6d0

  • SHA1

    db6b6f3b23df6066b71292c81b191d4a540adad2

  • SHA256

    3ed5c067b89acc26e140f09db9ae2eb4d6062c5a01f04b77c8ca57a5235e4062

  • SHA512

    fb5af9c22dc817d09dde91edbdb6458d7b72f2c7772a6fa22d8cf380fc46e6fd5179e2ade8d282b0441da318025f79a57bf1e95a79ce480cb1d551e43632032d

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJ5DVSWu0SWuA35:9QWpze+eJfFpsJOfFpsJ5DVSWu0SWu6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3138) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\96fe929ee89a51b3a659751b37bee6d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\96fe929ee89a51b3a659751b37bee6d0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    71KB

    MD5

    7d6012abd16a1b456c61efda5d7deb7f

    SHA1

    5ebf6d9ddcb0170b060b92dd9bb3d2d4163d522f

    SHA256

    24b006a4b97af5195d87f731b3d7dfbf14d27ec7c47e65466d80258bcad0baa9

    SHA512

    e587a50743b1b4809db52f8871ce1084c7a8ffc9b0bfd699ef094879cdf2748b08f5f7bec082f049622ced800f8fdca8655e8e283c0bb991d601e2e4f48c9dc2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    80KB

    MD5

    025c0b34fd831e466b6bdb23af58913d

    SHA1

    b97b789ff4359051b8f9861ad24bf63e689a662c

    SHA256

    cde888b1496a3d0f05d04678e07733cb6096eafb9fbb5d9d4bf715628e3d3d2e

    SHA512

    eb4db62996de2b3aec40ce48d315e02bbc985769711667d816fe2636278dfbd9574301da5698566fa877f61129f5a8b4240e83246a365ca6c5f27ceb9b604f48

  • memory/2380-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2380-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB