Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 08:20

General

  • Target

    8389cead0fec90d623e53d0224e503b0N.exe

  • Size

    51KB

  • MD5

    8389cead0fec90d623e53d0224e503b0

  • SHA1

    f578fe42d82d858521d38fc51f177a2d6d2a767e

  • SHA256

    dbb59fe3de114613ac4f8bd8598f6bc35aef1c577ee5fd36d9797de80a819a4f

  • SHA512

    752dd54aeea0003f0e440e20ffd7dcdd6bf3df07d6f1189ce2c5e9ff1aadc9ca0abefbdf1e4f576e4bf509df0b644ce5f6f18c68f35446c8e07b21ecdb640512

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/Fzzwz72Jwuq2JwuR0U0IOe2eQOUaHOUae:/7BlpQpARFbhNIiJwsJwwnZOe2epke

Score
9/10

Malware Config

Signatures

  • Renames multiple (409) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8389cead0fec90d623e53d0224e503b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8389cead0fec90d623e53d0224e503b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    fb067b61fefaa1bc2bf784a2368d25fb

    SHA1

    d56b86e34fcf95b0a47f4c839615f51bdea04583

    SHA256

    567b7b4e3c86743d3e6f9f0d1e12c7d64ba39df90d07d4b9d2d2ee81f3371fca

    SHA512

    39a0a8b0a60f657b5178f478e8cfc1fcf36a11262dbdc87f7e9ea79ff1554a221298eec6c98ab652c3e0f3f98d8c1fc2de2256cedf5fffe1c1309ed0ddb0ce74

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    6d1188d1860250c4e07e3796a9751b9f

    SHA1

    0c7883bd9cd751afe1d00d40d27d23596c1db094

    SHA256

    44f482a319bb0131b9e955272d1b307d5fde3ac79b17a27e150949623cedb88d

    SHA512

    001e72a3cd4de1d69a716004b3b4aa742b4214815a27579a2fa26207ba14f4d9e55c0f3f5fafed73d91dad4b1ffac33936f489f7750b73a9821bfd952b0e31f4

  • memory/2952-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2952-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB