Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 11:04

General

  • Target

    f47bade02147abe2bc3fa6f95dc67bf0N.exe

  • Size

    46KB

  • MD5

    f47bade02147abe2bc3fa6f95dc67bf0

  • SHA1

    e84398cca0bac20b05b409b78ed0da61a5aef4b3

  • SHA256

    486c12796dae49b0ee30d656a534131f0edbb8d398f7b790fbf8cb7aca99fc98

  • SHA512

    2fe9ef627d287b7689b6e208619b713228783b5fd5d0afc3e7d687f908231b6c1e421f5590579fbd8b1f9230bd972329eda65c1983fc720a3ab47d061055b234

  • SSDEEP

    768:W7BlpppARFbhjbhQYjY+WyKoIWbsHfySkT5GeQbyi348oWc1RPOzkjId6q8UdrSH:W7ZppApBMyKoIWbsHfySkT5GeCyi348U

Score
9/10

Malware Config

Signatures

  • Renames multiple (3240) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f47bade02147abe2bc3fa6f95dc67bf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\f47bade02147abe2bc3fa6f95dc67bf0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    bbc5c85d750f032802de8cb3641ad29c

    SHA1

    0d4d1011f8b59bdfdd9992d38f36db88a56b4ebc

    SHA256

    03603bee79f82b073021ab29cd5c818e0d4291afd4c7f05107a22e8e718e848e

    SHA512

    f43be42ffc84ae587a5d8396c0473ed75b9285fb04151c35ba019a670f5b61db54466c48454ef494a06f8d1b13af2ed404f7538c2e66200070e51dcc4a4dc425

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    a1e282c4fac6cabf623a243368ee4305

    SHA1

    c19abda6038ff2cbee34909ca9b90e186b5cccca

    SHA256

    b932db6491e0f1ef640210a5e9280c8fc01c70ee900ded92925e1ad731460398

    SHA512

    b65639d1c73ea173b947229c8b37edfeecf2db0b86ea916097ec30b6ab30ce2e47623ea856470320dac2be12f1d2d977df1887d1d70b0bfedfef9f16ec572e8e