Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 03:50

General

  • Target

    f94740dd5b82c2b85cf5bb36609c2e90N.exe

  • Size

    85KB

  • MD5

    f94740dd5b82c2b85cf5bb36609c2e90

  • SHA1

    b7a9e2aa791027a1b6d93b46307062dd7a67a46f

  • SHA256

    1a47b1adc04ddbb9e5e2104298b8337b69d0f9ca15cf19de86899659076c416b

  • SHA512

    a8c2c5fbd525d33451c69049582d2a1dad8b76226858a4bcf4ca6d3cef809c326349f5fb17f63385a8bbd15c13e873b12796d79cfd22e5558da18fd55b491a9a

  • SSDEEP

    1536:W7ZppApUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFsAcEh7:6pWpUFpEhLfyBtPf50FWkFpPDze/qFs+

Score
9/10

Malware Config

Signatures

  • Renames multiple (3164) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f94740dd5b82c2b85cf5bb36609c2e90N.exe
    "C:\Users\Admin\AppData\Local\Temp\f94740dd5b82c2b85cf5bb36609c2e90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    85KB

    MD5

    07bb8d3fa80b32f23cbf929ee6cb720f

    SHA1

    a0d5c2688e6c6a3c8306f57b094162b518b35d04

    SHA256

    a8a69fee09b6d4137750a3682b89a2efd7d076468b54c1ea0afbe8de43739121

    SHA512

    1812e89bd04476eab74a1efab0a6760c704a884d9edb06c43ab2653f66f051a84c47d811cbdb16759ec01f24bb008ff67d0417de5a214f9d25d6392347554595

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    94KB

    MD5

    daf5ef76b6316adc1e8b5aaf48c787e3

    SHA1

    325be643a3b0de8490ab6e68d336ecb4b6f07629

    SHA256

    6c9c8141eca2c7a566bf24bf3c2cd885f47c146e4b1bc28d38d1fce474043262

    SHA512

    fa27874c774a3836e75e2b0863b6b5f1bf95c8020c0732271048325aa859e9ec4ea9b3c97335e92366ac78e7e12772ac8a2a24c3b59554e5423a974add59ab19