Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 12:14

General

  • Target

    c08c8f96d1ddcbfcf9f48241536f4c50N.exe

  • Size

    43KB

  • MD5

    c08c8f96d1ddcbfcf9f48241536f4c50

  • SHA1

    14d38d15fbb4984a0a7994af06e8ebc1324519ab

  • SHA256

    a743c4ecf4f83e6ef2b1d77d5fa9f421a68a9ff39c601e8dc6615031714071a9

  • SHA512

    4a514ec6e95f4eeb08320d4562cf9e4146731b1841727d3b0a3d44252ad444ec8a06accdf6eb4e92dec40912f1bfa51d2cc9ab185ed2fd6449cf7351fb07c517

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOTlHdrBdrR:W7ZhA7pApM21LOA1LOF

Score
9/10

Malware Config

Signatures

  • Renames multiple (3313) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c08c8f96d1ddcbfcf9f48241536f4c50N.exe
    "C:\Users\Admin\AppData\Local\Temp\c08c8f96d1ddcbfcf9f48241536f4c50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    b895e59f2ce277383dba69497b6da4ec

    SHA1

    3bc9c51e2a83e450e55e76548c441a618cd5a60b

    SHA256

    4f221c58d0a662e42753b49ea99e4bceaae467570162d46a23a90c6962f43b26

    SHA512

    5e2adf391dc22a78890ad65c50993e58db6149eb364e813a35f248d4fd6c91f63b5cfabab1c8b0901b727a94fa8d412c837bf5db97629694241dbe5ec18b4b76

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    7cf1935ae2c4f1fa81f75a2cf768bc39

    SHA1

    ec08f444e7295f7119d092c23c84f3a0165e3a11

    SHA256

    31c19768aa1403291e182009e50d37f3eee2e5509ef28eeb5c78380053a9e953

    SHA512

    e707732b7dee115a5042833eb5e4a50bfac510d473c9dfc9ea82c824aeb607b373338305a2008914948acdac66088d218b5d20a5130affeef8cb61f871c79765