Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 17:03

General

  • Target

    2410bf35ee7086cf1bb0970ce580f340N.exe

  • Size

    104KB

  • MD5

    2410bf35ee7086cf1bb0970ce580f340

  • SHA1

    e5fff1f4f08d6863999ae98d158e58ebb7ba4cad

  • SHA256

    f7c3a807d9f1f215d8c192636a523013c106b8ff676d9900feec9c52693c0f95

  • SHA512

    07c27d8941e190342419bdb0a04aae1064d3d4e89a64d2f9ea8bf30805bd8fa933dc7c21016e7b84ba3129fcea4b0fa01867f4dd92780901f2d616b141198b7b

  • SSDEEP

    3072:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFslEhLfyB2:PqFF2Ie+efsLy

Score
9/10

Malware Config

Signatures

  • Renames multiple (2848) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2410bf35ee7086cf1bb0970ce580f340N.exe
    "C:\Users\Admin\AppData\Local\Temp\2410bf35ee7086cf1bb0970ce580f340N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    105KB

    MD5

    f5555113b27778014626d3d1c5ca00b2

    SHA1

    5291d17fa154acdf9f763ab28e364d706383fc4d

    SHA256

    8e32ccfc025b6950a83541620adc6395a67d31deeab14ec537f038b9dc405ece

    SHA512

    7a4310201f607b1c62826806f18d2e8ccbf3fcc51079fd37add750e7ebc2afcf6377db30a276290f6e21e99375ae1be59051e820c143a92bbd0a15b6c4f613c1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    113KB

    MD5

    661abfe1bce14bafa932ac905c81567c

    SHA1

    454e7c3b275ca48044a38a3f884882ee8981ebf7

    SHA256

    ca2979a0a9f7ad6d84cf686105d315963ec31cd4eadf26d5d0f55c7e65040bed

    SHA512

    0e5337ff3953d9d6da3e61196146d23910fd03964a255b262e24621fa93055f36acae502754591d65eb9c60c986aa854fd8a3d696a56a20b842919f415687953