Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 16:25

General

  • Target

    c69c13c20fe6c8ab50121f32195eafb0N.exe

  • Size

    45KB

  • MD5

    c69c13c20fe6c8ab50121f32195eafb0

  • SHA1

    59745bad79238da8f8c648ac5fd67b53da64932e

  • SHA256

    da21ee703a09dc1e2a06d47bf7afd486b391844366235803e63cf5b6f8535cde

  • SHA512

    19f52ad5a3de0a8f2ea0cf6184e6c77ab94062acbfefa20be85e9d3e05e9761d71ea8f7768413a41372908e26ba37a9147bedaa78a50c8e70d26055d7b89fdaf

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFXpK5c5khwRDThwRDN:W7ZppApBULcfpHLcfpyDA6swXwv

Score
9/10

Malware Config

Signatures

  • Renames multiple (3249) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c69c13c20fe6c8ab50121f32195eafb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c69c13c20fe6c8ab50121f32195eafb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    7339c8cacc9630b6cb8fd40d29c68094

    SHA1

    34bedb4e4645681cd7860c9084351da536a059e5

    SHA256

    093f2ff8c77c39930d61c06c816a06e2839f0958f42d793fe3153e8a66b6e9b2

    SHA512

    7edcf71d7952542f1da350feb2db955e0c4d1c2b5e842d91a29d14e58a0b29e700406a1130879d82a72ab48f97edc0b2a3e136438b356670701db6fd9a0c7d63

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    086220634fae066952aaaf9dabdfa892

    SHA1

    4155a3441a57f34b225f6c4792676df107a3680d

    SHA256

    48b573ea88eccf3e72d7d552817fb8a4f56caef3ee8f0b5836dcff405a634c31

    SHA512

    64723503cb247eaaa436b9b099c0756d28c65404de10152cbc0260cfc5df118698ae0e701c811ec27ceab495e751588e57425d45b9e626968ea1468ab22ce27f