Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 21:26

General

  • Target

    e5b62a3d73316b9fb34f32d34d8acb80N.exe

  • Size

    89KB

  • MD5

    e5b62a3d73316b9fb34f32d34d8acb80

  • SHA1

    3483469376667c445a6673cdaf2c88e5de3ceacf

  • SHA256

    14f8091146b9f07c15d7fce4d16387037561c35b7ada9bb20dfe2c73e1bf7562

  • SHA512

    1b142d407fad6fea8823fe208812d3dbc270b06f4cce2c5ce0908b34674aa4aa8580202c097dab1de544854f7837dea010f13573ce26f02af734b82f87eb3324

  • SSDEEP

    768:/7BlpQpARFbhiWb8naOnaBGNB3NIw3NIH+3m0mv:/7ZQpAp/Eaiau3NIw3NI2m0mv

Score
9/10

Malware Config

Signatures

  • Renames multiple (3122) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5b62a3d73316b9fb34f32d34d8acb80N.exe
    "C:\Users\Admin\AppData\Local\Temp\e5b62a3d73316b9fb34f32d34d8acb80N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    89KB

    MD5

    d04b18261e739dddfaea587ce7c7b79f

    SHA1

    6c8bab94dcc1204f081ce871825222b963e628be

    SHA256

    8ce7ff0ce6bee44891e9e41a5bcb0a77b27f94cf43b95fb259df978daf1398e3

    SHA512

    114336df91f711824a7ae07763793d16853d58ee52b67a16ff5486a9dc31aecdaca16cfc5ee23c85befebd9197e6bf244b8b84267c9621a48fc45c94e4db188d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    98KB

    MD5

    79a4bcd02371744c5a089e4932211a79

    SHA1

    7942bc6ed7ccd618c6b8de23cd74ff4fa0ad0877

    SHA256

    9dc57401b91e2ac882ed9c2e06b0c1c8e78db40997b6660b5fc416cd9a2e0c8d

    SHA512

    ab3c123a99e03e7e0c2de693f1c8d7ddb72252e4ccf5a0ba9428197906611dd951a6d944403a0fbd1e7870a172c9abf3e82007105d0b5462fd0b93bca10452f1

  • memory/2176-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2176-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB