Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 10:46 UTC

General

  • Target

    2a7d2101c8154f1dff617cb0a49aa8f0N.exe

  • Size

    41KB

  • MD5

    2a7d2101c8154f1dff617cb0a49aa8f0

  • SHA1

    8f9247ebcad94bef07306c420dea1ad1b71525d0

  • SHA256

    3a79c22de6144d9ecc4a5a48ed944b4ffd4b5214ecceac5edb6868fba0ef97c3

  • SHA512

    69b174510f1969f8a90dd20e768274a871356e33ec6678b857fd364145087f7bed44414681dec821c8ba1651e3e7802efcc07bf2be1638adfd1d1ff5b4a1e39a

  • SSDEEP

    192:tACUADIY0Br5xjL/FAgAQmP1oynLb22v7b22vZ11F1pJ3P30k:GBt7Br5xjL9AgA71Fbhv7bhvZ11F1nPV

Score
9/10

Malware Config

Signatures

  • Renames multiple (3436) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a7d2101c8154f1dff617cb0a49aa8f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2a7d2101c8154f1dff617cb0a49aa8f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    2e7d43a20ac83987b6858038b6b8f24d

    SHA1

    88c669d787467fff2283251bb759e11be960c61b

    SHA256

    69ec5d7f84e6a47824bd47484eb22a7641c2bf47e74e826ba1ca6068b0704a39

    SHA512

    07fc8b7fac2144e08d6782fe00d6c3ddb25465515d19b4d46fd6e5f2b683d62f6ee86c43e8b3f12ffa8daf1816c86cf38fb6388e279eb4a9a4f67f61c3835aab

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    8ab18096a4e463f04a47596b59d1b31d

    SHA1

    bdcb13b6b7e5e5d8ca513769239402cda2732834

    SHA256

    b131108fbf827cc553247b8c82c5af73047f9623cf2819fa6421a54bb7297a23

    SHA512

    a094c417e68a0d54c727d0baffadff3306e9681f7d939abf147f65081a456a8a450f6914c0487e390b7fde338207de858d45d68c9244ad6ba739067a71864ebf

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.