Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 16:37

General

  • Target

    76a3289c32d60f191e296538b4366e90N.exe

  • Size

    41KB

  • MD5

    76a3289c32d60f191e296538b4366e90

  • SHA1

    7bcb3db8f0de34729d56cf40c28cf49d5f6c2b90

  • SHA256

    cd362961d73aaec6159b98c2dcfdc0c91c51957abb597002a012b16243abb57b

  • SHA512

    9fa672626edda7fb1c3d169fc83f9229cad23af63009d8d5ff76c41b2bb7916786ddc5729ef90e95ef9b3e4d2b06778302bdd824fd276d6747796d7b284959d6

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHA9jxje6OMmy6OMmIGR:yBs7Br5xjL8AgA71Fbhv/Fzzwzl83/H

Score
9/10

Malware Config

Signatures

  • Renames multiple (3217) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\76a3289c32d60f191e296538b4366e90N.exe
    "C:\Users\Admin\AppData\Local\Temp\76a3289c32d60f191e296538b4366e90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    ec5e7971fa0b6d22d5265fc640299c99

    SHA1

    cc30ee844223b0ecd50fcd4f85661a4cb62eeaae

    SHA256

    789dbabec649e7b87296b5451f0076494275bf1fe7aec9fd98bd55c08ae19a4a

    SHA512

    276d6b4f10c71ef97cf39419cdc50a8bcc8997ee34f043086b6606acd99b0485a150c376602295590e21184cd35cdc47ab604bcbad523345ccba988d6a3b9ef6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    240a798a56a8ef814e6aa754bcb38135

    SHA1

    8038da589878604de4a708c129c64ac9c79fd93f

    SHA256

    cd6645581ef88f662fbb1f8122bf09c1ae0edc72a2fbd34d35e33a36168ad0c9

    SHA512

    d87a4c00d414b5796c596aa313a84d0b6c2595d4fcd0081c575e35e54c8072ade57a84eeaa2dd5cbed42f4c01d0a94762340a8ef2d2db4168908797a669035b5

  • memory/1708-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1708-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB