Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 01:54

General

  • Target

    f19f57d4776141262e4d1eedbef0dc60N.exe

  • Size

    53KB

  • MD5

    f19f57d4776141262e4d1eedbef0dc60

  • SHA1

    e928e5c1ef05ad3c657db2fd26a0fc85fa182dbd

  • SHA256

    3723657cbd7042dfdf4d10321141082ceb75b9fc45d9e4950daa1dd76b45e754

  • SHA512

    e87a5ba971ce12f02daa296d550fb6551d568fd6186e674c4bc2bb06dfe3d3504954a786359e694fd14297a8de898bee501ced94c1f758433b322a3c87de760e

  • SSDEEP

    1536:W7ZppApBULcfpHLcfpyDoAQeLeAeLeJ0Pnv:6pWpBwchcwDqnv

Score
9/10

Malware Config

Signatures

  • Renames multiple (3277) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f19f57d4776141262e4d1eedbef0dc60N.exe
    "C:\Users\Admin\AppData\Local\Temp\f19f57d4776141262e4d1eedbef0dc60N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    cadd5ee877b2ff4ade197e0be1d43dbb

    SHA1

    01cd8d6dea32edba4e56df1c6e1d5830315148e6

    SHA256

    90fdec5b97671414e91dde828ade0625f7616e720f508322638766339062656d

    SHA512

    ecc78c0de0213e89514d14335593bbabab8016e232cd205573a47680c07db2df142c07c09c3b7ef493cc2de9bf0228675f5c54d34fe73949e4ba60f5e2a7da57

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    34b06dbaf57aebaaec6b7a24d5be113c

    SHA1

    2987aeb1215524024f0ea54291cdf6518da36cdb

    SHA256

    31ba01d35a63b01945593732451ac5548cb601763ab27df7abe35f91917b8c1e

    SHA512

    a1d0197fe45e7fad308da65e21c221038e6e0122587a193a1dd10c6207bbdb032755a4bcee30c91e558bc858bb40af27db18a4d1b03c180bfaec813e6aef5bff