Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 06:37

General

  • Target

    51c7515437279604a66d4b7ad0e20f50N.exe

  • Size

    44KB

  • MD5

    51c7515437279604a66d4b7ad0e20f50

  • SHA1

    d87cd9e035d7edca3d9913f1cfbcefef8eea8cfa

  • SHA256

    a9c46e8f6d9a1d486269e698175efe99e769c32af713c268889d268945558402

  • SHA512

    5b74296e65f5be0ca7f27d925dd41de88fc2afaf6c91b8d23ccbbc062d7ddce3d307953437ae802a5c4d040565d7cc01ad947eaf46e36c5cd3793b7077b7166d

  • SSDEEP

    384:GBt7Br5xjL7lAgA71Fbhvt3wso2IOiJvfo2IOiJv1vAvq:W7Blp9pARFbheso2IOiJvfo2IOiJvN

Score
9/10

Malware Config

Signatures

  • Renames multiple (3274) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\51c7515437279604a66d4b7ad0e20f50N.exe
    "C:\Users\Admin\AppData\Local\Temp\51c7515437279604a66d4b7ad0e20f50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    494774c6ecc9fa43860205bc1d9a14e2

    SHA1

    73eb6d70907f7c532051aee5ac851728cf2cd513

    SHA256

    fea020dd5277935c4480a6a0cc2109f0248f0650ffef7df9b483238c5f4b122b

    SHA512

    19e4f2f41cefa1fbb4ec87769a28a06aa0fce488be09626f414c4f2f33003c41ae483c064aff938ba949440cdf334ac8eeee87d6920605bab13cb7acf70fa0e8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    2ab1a1839d5cbff190317842d744ea40

    SHA1

    b1ae365d2966b90f3e800a994942f2eaa9fb6a41

    SHA256

    2667663e8dcd87b17a35be23c34ec1038e9c4f897874e3fa34cf12999e0af138

    SHA512

    e3a5c872c5a06d5e59c26df31914176a37b5c743d44c91ba0d421ea852a912c6c22c241d8e6863fba984905799934f0e609629dc08db90dddf1c166646d15c03