Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2024, 12:15

General

  • Target

    dabf11d4feaaad7864a85cfb54d6c250N.exe

  • Size

    43KB

  • MD5

    dabf11d4feaaad7864a85cfb54d6c250

  • SHA1

    b40ccc4a1b7a460608ff0a15d210aef3e877ad91

  • SHA256

    9e1fdd19e82803662c9c166f01d5dc2a0ccd464aafde12316bc8921ea23c2bd9

  • SHA512

    a588a3962b234a039e70ca90fd6f4c1a68395e0d1f27268395ae0df2b89b084d9e8396c4a3e1b35ddf30b1ea14670e028eac1d684781ea9dc45257bd28104917

  • SSDEEP

    768:W7Blp2sspARFbh5YSfff9n1oXKCqzEIn1oXKCqzEM86:W7Z2sspAp5YSfffF

Score
9/10

Malware Config

Signatures

  • Renames multiple (3218) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dabf11d4feaaad7864a85cfb54d6c250N.exe
    "C:\Users\Admin\AppData\Local\Temp\dabf11d4feaaad7864a85cfb54d6c250N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    b771fcee2f18be545f1dce6e662bcf93

    SHA1

    4f34ab1308a5be6e450f0e9dd8ad8433ec31d36c

    SHA256

    f43013a17f995b317751ab5f2e12b6f7d2a04dc0e8c97296a41f34f89e7832c3

    SHA512

    1c1423abd17ef82a174836d5b484aa3a704f1f84ab10d965036e458dd5bdd1eee5f75c9a90a9a573f43a31f0e4b5ee8595d22d6d3f796afb3adc7ce77c3bc9fe

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    38fe8047c3c6c9d476a451282f5421e5

    SHA1

    1d9efc4f02efb0d74433be3c85d418610c8c58c4

    SHA256

    f1126e9c7895bf6380cca13fbfa037c2fdd6820d6187d483190db200458aa9c2

    SHA512

    1930af51a28e27549443a5cb483743e349e90f55fca7aff0d21d854b8395bc5b5e5c5ae72e8110115d99192e86dfe5417ac234c9646d59998b96e9beca53ce96