Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 19:15

General

  • Target

    188c92fad20e985cfaa121a17a2486ed278577f4dbd7bdd14db5e50b46a0bf1f.exe

  • Size

    43KB

  • MD5

    4adf60f07301aa8fc2f78349fc26a10c

  • SHA1

    01bb60461df6b361700660863154a65f6d30c5db

  • SHA256

    188c92fad20e985cfaa121a17a2486ed278577f4dbd7bdd14db5e50b46a0bf1f

  • SHA512

    ef32c7ce0990cb5fd95ba341aa616248acaf1414b9806d9543f1dd541780a84b1f3b080f4c6cbdeb82db929221824f175d597b984333b38b98e1dd22ac2309d8

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzSMn76GRI0Mn76GRI8:/7BlpQpARFbhNISC76QC76A

Score
9/10

Malware Config

Signatures

  • Renames multiple (3932) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\188c92fad20e985cfaa121a17a2486ed278577f4dbd7bdd14db5e50b46a0bf1f.exe
    "C:\Users\Admin\AppData\Local\Temp\188c92fad20e985cfaa121a17a2486ed278577f4dbd7bdd14db5e50b46a0bf1f.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    a5674c12ffa939ee0d4f886d501de456

    SHA1

    5c63f99103cba026f59068480ae2cc9277741f16

    SHA256

    7b535fcc65db2aae3ac7b4afff1f80e4a1a986084eb1f5c44caf5f141fb74550

    SHA512

    7589e3416d7506ab63a4abe52ba419fd2065e723fcba262707fef33625f3aa28c67df6cea58f83e70029689ddd0e52068a07e5e1cef44f7689d689f2d0a4064d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    cc7cfddf0bc164e3f25c79f7fdcdbae7

    SHA1

    612202ffa27778a7c1fc69ea52fdfd737a1632ac

    SHA256

    2a5fd6b363320fc2aa0a4f2eefee20e0bcb24a47fb6dc589c06be1416608e049

    SHA512

    0ce2165a5ffc165b7ba869cb073b5d586fe963f60a1881d33a6b69dcfbb19fdbf6560eee73dded714be36dac82dfa77dcc3ab33ff6b73380ab5d907b5310189c

  • memory/2256-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2256-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB