Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 07:25

General

  • Target

    0d5373af4c51b76f2560a423d3b65070N.exe

  • Size

    99KB

  • MD5

    0d5373af4c51b76f2560a423d3b65070

  • SHA1

    8ff083613ee2b318269004d001fd34155243cfda

  • SHA256

    ab14d5df5610512362a8742e857cedc23c822d868cbc5683709de23ddf73aef7

  • SHA512

    deb75ddb394b4e5800a2514e39b6412b328361fe27604b9fef592caf1efcf5e3f94580e340025bb476555ed5519060568322d998e385ab5a98f38713ffa01789

  • SSDEEP

    3072:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFslEhLfyBm:PqFF2Ie+efsLy

Score
9/10

Malware Config

Signatures

  • Renames multiple (2840) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d5373af4c51b76f2560a423d3b65070N.exe
    "C:\Users\Admin\AppData\Local\Temp\0d5373af4c51b76f2560a423d3b65070N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    99KB

    MD5

    cfd12695b75539cc36f3b153911b39eb

    SHA1

    89e83c8e48ce68f2f65f9959cd33b18c6b23f44c

    SHA256

    2439500952307a5b0805ba97993843a7e313034b9aa645ace12bbeb4980e3a78

    SHA512

    8ef62b22d61bd1e3bf91c5c5c654577021f581570bd3fcc50bbfcb0bf0fd4e64c81c523bc8e5e69aa406972a9a9ea98efc24b2a6f0443947c3d95f561d5a3bfd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    108KB

    MD5

    4e0940ef43d3992277d53e4290a1d9f0

    SHA1

    4cd291729b7f5c902f893f6c5b09935fc6cf2fe4

    SHA256

    cc3db5db636bca89c338016a6b2c6bcf280ac0f3fd020cafea5b046d4e3e660c

    SHA512

    3ac67933976b4c6f4c863ea9cc2152423c62b9b021fd5f8d5846a517c689c9d7a26919a0d33a34da67999c02d182baca479a6bdb7e30a05545d8d79bad75c35f