Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 09:59

General

  • Target

    3ed030e6b28edd44a7013f521c8decd0N.exe

  • Size

    75KB

  • MD5

    3ed030e6b28edd44a7013f521c8decd0

  • SHA1

    66d0006410ba7081548a6d7c6861df01494c762e

  • SHA256

    caa8605f91e11fa97866de898432330fbab4e640fe192fa2a6f28ab223d77b96

  • SHA512

    9ac667f826b98afae0e989386b1a68fc262756e7f9d9867810046cdf7f2fd20fdd567c96de498327da0ee49f98ad8be096c3a07fb2bb11ae7c6a6ff5098df9b7

  • SSDEEP

    384:GBt7Br5xjL9A7AgA71FbhvnwR/s4NW2sl4c3KbsvrTgOzkJAopyVFlgLfQf+PZfW:W7BlphA7pARFbhM0KW2s9B4hofAe

Score
9/10

Malware Config

Signatures

  • Renames multiple (3228) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ed030e6b28edd44a7013f521c8decd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3ed030e6b28edd44a7013f521c8decd0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    2cccc7c848c24c8dd584f1c64227120f

    SHA1

    572d3fe9a068c8e8993c3675b2269c56c5062474

    SHA256

    6fa67a357a3462e14d7eab0ddf0075ffb0125194c35dfdd7cc05088417834990

    SHA512

    3c2b1834adc07a005c015e362d034a856eb843d295d2f606f7161731864a75d1307f5368b1fe6d4930976b5e2b51c7ffc53519e4ac907c80162cd8d6e6d7e2a0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    84KB

    MD5

    8a95449690b87dcfc7a78909d682e96a

    SHA1

    08f4103fca6b7fc44eb5fcd9bc5585690a327ff9

    SHA256

    799c817a8c1037c252e684de8841dd48dabc54504ceede499407ca557aea953f

    SHA512

    51963a2f9c403cf239d50ec95558148b47610c7dc4c1851e9df7f4d7d1658c17918b92b9c96cc8d1a70ee433cbaf16b99661bef223dee99e08294c24f5dbe226