Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 21:24

General

  • Target

    46983066f63b828f0703f5d94fe2b3ad8f6605e1a19202dc2b5f83ce7959cc2e.exe

  • Size

    46KB

  • MD5

    6349e065fd95101983512a5c6972aa95

  • SHA1

    03dc75d759334802e02ce288e264218ecbd576b6

  • SHA256

    46983066f63b828f0703f5d94fe2b3ad8f6605e1a19202dc2b5f83ce7959cc2e

  • SHA512

    94e46569d2a3f11c0dacffca015915c25d49b972ac1868fb1c2964bcd086dcca1432aafe0a6d06fdcfe57dc2f0b75dc84dbf2f1f4208e13526387add3a0d4402

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFXpK5c5S2Y8/32Y8/e:W7ZppApBULcfpHLcfpyDA6Z

Score
9/10

Malware Config

Signatures

  • Renames multiple (3728) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\46983066f63b828f0703f5d94fe2b3ad8f6605e1a19202dc2b5f83ce7959cc2e.exe
    "C:\Users\Admin\AppData\Local\Temp\46983066f63b828f0703f5d94fe2b3ad8f6605e1a19202dc2b5f83ce7959cc2e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    7f6ae3cfa538a1ea9c08ee55c4eb048f

    SHA1

    c3e2bea767dfcf7775143af233f273613b209f12

    SHA256

    8fdf269d39f164214a911e6a5cfd245601dbd6e50522c7847a7d6bbf2fc0a547

    SHA512

    b130aac308a08a541bd7829a2d3d7fe72c094e200d99e40a4810e0974536f6bc7df16ecba619fa40147e70d5b962ad5bea8aff2dde0240600311c0b78b270596

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    37047186134b7049d2e0ff47ba88c7b8

    SHA1

    e5660675bcfd246a601e5197f3460f89e800ebf0

    SHA256

    f230321abaf8396e634717b46ce34e88d7fca39bcff6073faf0dfadea04faa93

    SHA512

    6d86f1924a30d3561d866d34e01ae9bec2c5e82e6f33f94e80133dfc4f3e35be25d437c06466c2a37f09be55ab11dc004299885cc2dc3341d02cbd77ed8819de