Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 02:50

General

  • Target

    1f6463ce49cbfcd2270a6fb7ca72af80N.exe

  • Size

    50KB

  • MD5

    1f6463ce49cbfcd2270a6fb7ca72af80

  • SHA1

    03aaeb0a5d85c56d02813572a4018376e7e44257

  • SHA256

    96174f7fc5959a824965a8cb8c11b3f6577bcaef8501a9df5f20e031259a6ad8

  • SHA512

    7cb402dd4f4cd975c68a73660cc6756d5cadc346c31f663af603d8b1a671ed8213fa4170224b8fdbfde06b76161c623ce987cbb563d9e8578b357c6d7245a4fd

  • SSDEEP

    384:GBt7Br5xjL7lAgA71Fbhvt3h+fZmrs71I8fZmrs71IUoV0K0G06:W7Blp9pARFbhCRYstRYsyV0Hj6

Score
9/10

Malware Config

Signatures

  • Renames multiple (2854) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f6463ce49cbfcd2270a6fb7ca72af80N.exe
    "C:\Users\Admin\AppData\Local\Temp\1f6463ce49cbfcd2270a6fb7ca72af80N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    75a6f872d3f16ccc704e35269bd3562c

    SHA1

    12aead18618b5858e159452f31e1ffed33b57e12

    SHA256

    ab2c967744ed433abf125a15a46d2ddce199f0585b22b6a573d0a6e3a0109181

    SHA512

    98988de5da0152c806fb9ca09bcc00abc22ba37606e4ff6d5f8868a3cf6c4ee1a78b6703ab703f3868bb7453fe3b4eef7e161fe77fd96d2a4814cef7fa3e6f68

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    bee5e6674bee0acf16a41301576dcda9

    SHA1

    09750a5eeb906c48da961a26ba736461519b425f

    SHA256

    ef45c9aa8e871865bc8e3af16f962cac0b8d3a1991858fcf58799704a55c0b55

    SHA512

    d83630a06174bb52fb522d9c6efb9365b39a6075a64170ff1c7e7d4944674376947c2950c8f6ee244254ac8f0bb7706b2606e1d822a03038c1297ab102ee274f