Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 08:08

General

  • Target

    f7732e42824233fe325d0e1bb2e13620N.exe

  • Size

    46KB

  • MD5

    f7732e42824233fe325d0e1bb2e13620

  • SHA1

    46fdefd473991a6f066a098e4959cf0ddb934071

  • SHA256

    1243e808a3e36417bfed7cefa4e40e285bc3b6bad7452cfed76b4dfdf7e5ef74

  • SHA512

    a68779dd54157ffa1384fe6d9792d2611621c4d6473b122b86324d6d4917ac608b67c7e0d8b44ae99f5e85c1249c92ef147f56290013c549435ac94f2f3059fd

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw1VyjVyXLeCee:W7ZppApyVyjVyXn

Score
9/10

Malware Config

Signatures

  • Renames multiple (3254) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7732e42824233fe325d0e1bb2e13620N.exe
    "C:\Users\Admin\AppData\Local\Temp\f7732e42824233fe325d0e1bb2e13620N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    30d6e854c544def54908cb8ce0de7d0f

    SHA1

    afe4e622340f60fe631b19cfb9e63df01f135bc9

    SHA256

    5e70bba905e355102608cb23ed62c62de36edf1aefedd1d4f442578f2248ee53

    SHA512

    86030cdd7fbd257610e7f83a7a6e15dcd94e10fff38ae21c7bb86b47f743804cb344b35a89293422dde61d74645ee4814c0f327d15605a6d23e3651403a22411

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    a57362b6f99a31bd6bd5c1a064c0069b

    SHA1

    df47376d2e8b08d6381c88a190771e20d3425ed9

    SHA256

    1689cd2b74efa6c991c68d6a1aa80a1f5b80b2c2d6ab1f51ee5e1b1a1a08a389

    SHA512

    3be336c04e1cb95e54c6b78605d825c0f680707de65a20c6fa2c6401634f06b0085f14010abca9a9c0215f68cff904c901835a6efc6bbea376ab6490cf44b295