Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 19:34 UTC

General

  • Target

    36e0e2abcbc9d58f75be09be8e602910N.exe

  • Size

    108KB

  • MD5

    36e0e2abcbc9d58f75be09be8e602910

  • SHA1

    9bdb16d1182fdbd2e9ba6b1e1aed2ba72a8ef93a

  • SHA256

    31fd1454c9dcfa04ed0b2b48b99fa17c46af72cdd14f2e2de8629064ae0aac69

  • SHA512

    b51c67d6988a15337ff5a5d462276e61ac74f80a31c7155226dab6cbebe678b9b08fd99f355caf228c0d79d3709cd0d7d209833a123b410780d7a4086209507e

  • SSDEEP

    3072:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFslEhLfyBR:PqFF2Ie+efsim2QF

Score
9/10

Malware Config

Signatures

  • Renames multiple (2887) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\36e0e2abcbc9d58f75be09be8e602910N.exe
    "C:\Users\Admin\AppData\Local\Temp\36e0e2abcbc9d58f75be09be8e602910N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    108KB

    MD5

    d5333768793aa4660f831a654e1d5a73

    SHA1

    8981dcaf76e16c1d660ca06e8cc4f847775aa1be

    SHA256

    8194d3877cdef1c200450e14ff954d68809797a859205e6f5ac5d74e6f19a682

    SHA512

    4fad5753096ddfda1ab02a89a488bfb379c1f33f302e03493a4086d707d0a9d46d0c64135b7e0a1aee7e4067aa543a05fd9e42b949696ed28d364958df297fa6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    117KB

    MD5

    4dd972d9a6b370d595e752d46d20b0ae

    SHA1

    5c1e3c91a5e4da3ece0274fd2c87a69367e43530

    SHA256

    9da78bc8a82e49fb0a650b85f5d9054cd6e957cd7626af5d95349f1a7c6c58dc

    SHA512

    348b3c0eedc730b4f713511a44b67f9afa078f14280a8f7484678585933f2e2d1642dd44382d5722260413e2bfa93ac4eb77b4684a13fb3ac20da70dea7dbaaa

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.