Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 20:31

General

  • Target

    ebc7eec66bda908c7cd04e1c6000c880N.exe

  • Size

    56KB

  • MD5

    ebc7eec66bda908c7cd04e1c6000c880

  • SHA1

    672d8adb34c45294347c1b3645354311ca9caa6a

  • SHA256

    16a3b2cc561901c84086c2b890f6cb4c18331b2d65baf6b552fd669513a98c06

  • SHA512

    76ad26305b7998f2afd88e18861753e712fdce60dbf75c5dc4522d99ed77319f8ce6a2c5d98e98f231e9c7713b2ea00d1dce4459a86a386212f55a47d3df060a

  • SSDEEP

    768:W7BlphA7pARFbhL801VvM801Vvv7lSKSW7afHFCSW7afHF4NhZ8bwhZ8bz:W7ZhA7pApw03vR03vxSKSWu0SWuG76

Score
9/10

Malware Config

Signatures

  • Renames multiple (2928) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebc7eec66bda908c7cd04e1c6000c880N.exe
    "C:\Users\Admin\AppData\Local\Temp\ebc7eec66bda908c7cd04e1c6000c880N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    3d960f05ca1ef79cbe010249088ae266

    SHA1

    04b3829d7f57483f8948272b4e28332c2d6eb0ee

    SHA256

    0bf4651ea94ab7dbf5b86280832689e266424dc1d4dbd4acb31255df5e0dd88b

    SHA512

    dbc72449d34d3c685292eca0723a0db49440d2b3eafe0713a6a14e1bbfe68e55c8f65d4d24ae8ddbf739979fa8631d50d07c76e290fc659b243294881c766d3f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    d3ca02b33348d2156f7eb9709f8a53df

    SHA1

    85c18b761baae6fcc131d2b0917881599b6e8654

    SHA256

    c04d24010688ab8663b28d3a6351a1a157682c1973c28972e054c1d5faec2598

    SHA512

    7f0d81b455e0345cd53ccbf2e2c5796c4cb096767e6af20b2832703d4f20b7b510cc74ad2920ba1b4c6fa64826fd41ba78fe6492cb226fd2a341acc4b795ae00