Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 19:42

General

  • Target

    20fd99199312e1b551a54649c3bb7803e4f9213d98b492003f5a1a7f80c735e8.exe

  • Size

    47KB

  • MD5

    4aa940de38e334f3830dcec55db92f46

  • SHA1

    57305b8da79ccd2dbc34d337bf7950b6f27f0380

  • SHA256

    20fd99199312e1b551a54649c3bb7803e4f9213d98b492003f5a1a7f80c735e8

  • SHA512

    837b22b420b477c1931b8be882f86e9e0db861d793e6e2345d553cc1a4f9d13166eda8ba73fc90c0b1e16c13ed8538905829c7867ceebd453d6cda618294142d

  • SSDEEP

    768:/7BlpQpARFbhsYcUYcwaVl2di1xzaVl2di1xDw9:/7ZQpApsYcUYcwaVowfaVowM

Score
9/10

Malware Config

Signatures

  • Renames multiple (454) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\20fd99199312e1b551a54649c3bb7803e4f9213d98b492003f5a1a7f80c735e8.exe
    "C:\Users\Admin\AppData\Local\Temp\20fd99199312e1b551a54649c3bb7803e4f9213d98b492003f5a1a7f80c735e8.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    512fa7f09bfe70da5e889947eb88ed8b

    SHA1

    59a05cd02ab696e3f11e74b2e91717e284a2ab78

    SHA256

    8a04a8b5032f1c268cf73bbe41319a8a6a247752a1cada432ce112e0938361ff

    SHA512

    e15895b6a2ac99a324738880a977ae1d0aca01985f78705f9a7b3195a0ae1254a0b8e7c3dc56791d15aa9a9868ff4636276058e5a368a151f3f7e0196bb61863

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    eb05c2146ae2658dfe4a5d98f3a924ba

    SHA1

    cabec78927ab4583d4542aee2dfd81ad914befdb

    SHA256

    23a97d5d7016ce1cb814679e35dc7fcff1b8c211c3685c52951a51dfde6b1e86

    SHA512

    3777ba4303633d6255fe7fd8051634962974f577e79f274f1f5b27c5f964de6dbf08186789a8b253338f1ca8e6af4e7a45faff4a3f6e74365f75095c17fb59d3

  • memory/560-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/560-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB