Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 23:09

General

  • Target

    75efdfc0445a686023aa394ea8c66430N.exe

  • Size

    71KB

  • MD5

    75efdfc0445a686023aa394ea8c66430

  • SHA1

    253594bb668a2e82fb9ee19c98f49a55dc543351

  • SHA256

    441f34d82b3ef1625f424bf035b2a05f787f3184ad07963caea14d3ce38429ec

  • SHA512

    00cf73b58a6a658d40427281c7e84aff4d7a3b5c8f498e620bc147ee7fa9a7eae2231f552f9ccb1011ac5a1ff104f96ce1dc4a1f99acf14e55401280afea236e

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpVF/MF/3Nw/Nwk0cEMdV8IEMdV85/EUN6J2c:W7ZppApBULcfpHLcfpX2/Nw/NwmxBRn

Score
9/10

Malware Config

Signatures

  • Renames multiple (3178) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\75efdfc0445a686023aa394ea8c66430N.exe
    "C:\Users\Admin\AppData\Local\Temp\75efdfc0445a686023aa394ea8c66430N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    99e19da13124eb4d079d26bea406c730

    SHA1

    3bdbf82e1b29e39d60145e2f4d55c3142b10cbf7

    SHA256

    d589891a8d90dae02660dce0dc7117dc1611eef241b8947c366867fed35f63c8

    SHA512

    df6afa977e7929f279bd55e3fbedf2bd062d2566d18bdf7032d9f4ac9552a304da600d84a92b8c57b1687d5f2b5167516c7d08ab732d0161bdd079265c75b245

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    81KB

    MD5

    ce410fe5004afff93f98c539f667574c

    SHA1

    14cce53c112ad64b78c6cb9c2578a776e0492665

    SHA256

    63f1e2eec843b82abeb4e36f21727f8e43df896715c867c7abad5bd9cd20be0a

    SHA512

    500320a504c8d551b1763f69f12580324dfe38a0b6677a1b8f81c3ab3f66099a4078f136bf8b40e3b10e3c39f990173714fe0a597f826f96279434e168de65f8