Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 02:25

General

  • Target

    46315dc21511c941ef12217fbbe11b30N.exe

  • Size

    128KB

  • MD5

    46315dc21511c941ef12217fbbe11b30

  • SHA1

    4fbc564d1bb86cf466d69d3666b210b8958fce33

  • SHA256

    1d40a77f47423f64bb95b4a88de5a485d1f1bff325a521ce3f7e1b620a751887

  • SHA512

    d13343073225a38f2e426869304fe2359d779af58b9bb98bc3a6048fc3b7a626f5654a980b1ef81c4816515c5017f87910d055ee8b435ec3ff52ea82d4095a25

  • SSDEEP

    1536:W7ZNLpApCZrzLDPWGoPWGANdNykTBlv6Bll:6NLWpCZLBzHl2ll

Score
9/10

Malware Config

Signatures

  • Renames multiple (2857) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\46315dc21511c941ef12217fbbe11b30N.exe
    "C:\Users\Admin\AppData\Local\Temp\46315dc21511c941ef12217fbbe11b30N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    129KB

    MD5

    8c0c0e70a29b2670b3c849dd1a9edde5

    SHA1

    7962d789ba6f1b0ca4cde8640d44f6d6cf1c3265

    SHA256

    65f6946e3c476d7502a74c98e89797539fd94a42e0971f80a2bd98e00d537dc7

    SHA512

    1ad7cc4c1df8b8be859b0b2ff432c37984ff39306c7156d142d47485dbda2c8432941c58a31be0ebc1a472d18ea4e51f5b4503b93391a14c68aee4972fb21321

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    138KB

    MD5

    4b179f71604617e50cdca6c5b8607920

    SHA1

    835e146f06cebdd09e59cadf337f408b20ffc647

    SHA256

    e5732ed95a4fd01452ae6d76560013eda884d4a7ecf7973d2bd774e5fc7b0ac6

    SHA512

    3db23c0084191207296a9ca152b2f81120611ad4aeac801bf38c8d18dee445c9e2207366b9f5be1592c86f8b60bb3b57ad02c44cc4e69c69de186cc5f1432e70