Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 13:20

General

  • Target

    15e02d98df58fe2f4ba00ee0978536f0N.exe

  • Size

    53KB

  • MD5

    15e02d98df58fe2f4ba00ee0978536f0

  • SHA1

    d6e10c1008d900896b4bd0670fc5ceaa9b963f4b

  • SHA256

    22aaa433e29017b18ee4c6beff7a0dd7072c668ef062fd7c7a06bd1ff39c40df

  • SHA512

    de974e2ce2aaac6b68ed3fcfdfddb35cd6026ed6db9a47478ef06bf07ed16e54dc7916df2e46f400b1c86eaaa70816bee9adb2d21a05f94ae75646423f402aba

  • SSDEEP

    768:/7BlpQpARFbhfyiyooa0OMiJfoa0OMiJ2kAHAZIFRD+Vy2L1IFRD+Vy2L2QW8C:/7ZQpApHz8kAHAaRfRPQS

Score
9/10

Malware Config

Signatures

  • Renames multiple (3267) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15e02d98df58fe2f4ba00ee0978536f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\15e02d98df58fe2f4ba00ee0978536f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    e74912edc7517fee3179f4014f715727

    SHA1

    754e916e87442846de81be54cea162c17d0aff37

    SHA256

    f6b767e353aebcd6f1ce32220393e0b7ea681696a3f09f50e6507e752dcc8dc7

    SHA512

    7bc9e5d673a97b5149675db2d8625484fbce602df163c37ccd9a9d29edebf3f87ab45e562d92fc330b8ecea97200394be38feffabd0831838440c15f0d31c36f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    d73c8678ca0d3288b557818e538c46fd

    SHA1

    cb904fd11ead1a34428a23658a4077bc7e90f1fa

    SHA256

    498eba4234913cb307fdf3b444be4ddc9f9b6f02f7e54eadc4005c59a9221a3f

    SHA512

    9d42a9a667434cc7d60d2444b311ac62159238ef5df82168ff797cd268acba5711d56020a89eefa28cbf781e98415ff26e2a9350e1a0d6a7e66d53ec38c3164a

  • memory/1812-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1812-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB