Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 19:29

General

  • Target

    1c63eaf9d4293a3389862a450e455e7f9d1abea7a5863e1ad5b92ee1871be6cb.exe

  • Size

    98KB

  • MD5

    505f29dc70e14f71b90b35b7f1894b80

  • SHA1

    9b742470200413dfcb5cf9796265a315ffb2c4de

  • SHA256

    1c63eaf9d4293a3389862a450e455e7f9d1abea7a5863e1ad5b92ee1871be6cb

  • SHA512

    f24df27e8b826a5ac68c97e8298785e03ee50632d67b772aa5f069102a68d0a716a0e4dedf254ab0bdf89b336fa92dead10d5f92284b569303c2db89f835294c

  • SSDEEP

    3072:6e7WpMaxeb0CYJ97lEYNR73e+eN7HlulD:RqKvb0CYJ973e+eN7HAh

Score
9/10

Malware Config

Signatures

  • Renames multiple (3684) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c63eaf9d4293a3389862a450e455e7f9d1abea7a5863e1ad5b92ee1871be6cb.exe
    "C:\Users\Admin\AppData\Local\Temp\1c63eaf9d4293a3389862a450e455e7f9d1abea7a5863e1ad5b92ee1871be6cb.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    98KB

    MD5

    a89b7d39a03a2bf362227ac1cae53bef

    SHA1

    7035bd67b6bf47e93770d89db95d96d050082aeb

    SHA256

    fc9db6c3db4437f641d52cc51ba99e2a0587013c1429f294170be3820cda92bc

    SHA512

    21567bbeb78007cd9545568d886fee3c72bd0606eec3179076ef83332bb332f9ca177320e60ae585b9687fd32ba4e02443ce5c709bdbd13d5aa6c92fdce3639e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    107KB

    MD5

    b7bb4ce57c723ece1f17ee45efa1c9b0

    SHA1

    ff2560ab9817fea224b79af231ec2c649c06b763

    SHA256

    50fcbe08249d5423e144a43e5af4f910fc1fd443b97c8e0d87bc66569b9849c8

    SHA512

    f4c8d186e93023c12ff9675f37f8909d15e17ce9ff52a0dffd048a39dd3d4d7f078e54a30a1c6664c016edaa546ffb91867463e09bc93534e035af8a294ced61