Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 22:13

General

  • Target

    a7709cd7b37e9912885cb59a6b481d50N.exe

  • Size

    61KB

  • MD5

    a7709cd7b37e9912885cb59a6b481d50

  • SHA1

    f18b8d5f62bf12f4568fbb37a443e592d35bc1fd

  • SHA256

    99bba6ca2ea8d6315bccb87d2703530e3ef94fb748c543db5bc5921c644e8580

  • SHA512

    8a67aa552569d42748cb9c4a576aa9f7569c5a0c5671ba205abbe32d8c06598ebabfd2a282a70a3df005bb455ac80d96eb02e532698734eed0c9993c23e4d858

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpVF/MF/3Nw/Nwk0cEMdV8IEMdV85/w:W7ZppApBULcfpHLcfpX2/Nw/NwmxL

Score
9/10

Malware Config

Signatures

  • Renames multiple (3276) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7709cd7b37e9912885cb59a6b481d50N.exe
    "C:\Users\Admin\AppData\Local\Temp\a7709cd7b37e9912885cb59a6b481d50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    61KB

    MD5

    399eb14ca623d4e7e8a564bbb1f26d74

    SHA1

    9efd0a9daa71daca5386b294333af87c8bedc786

    SHA256

    1c4d49ae9f7624fcdde499b73a26d652be38ee469c65f6e987807f506da29b43

    SHA512

    1b719c56982d5b9ac52759acb31d10946318b4999843d1e952dbca2228e4b61c3f01783c9d93cf9cb0b035ca7ee4e89db1cd2de8dbc435232d5d31c8a88439d3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    70KB

    MD5

    09f8cd5a47e89b01dfa625d43cbff33c

    SHA1

    3b37f35e09851d90f52abffea8ef79f4b658ccac

    SHA256

    0f701e62cfb5a05f6582f4478246631a9595438788ebc7ffd6583db5f0aee804

    SHA512

    c0d5436cc4960feb4415ddea83337b32c9a6f7468ebaed31f91e8a4ea4fd89be423caae8a200714dbb42c2fc2388dbaebcb56a15fc4e8d287b2cbd64f38369e7