Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 07:50

General

  • Target

    232c59784d50a8ee5921bb0950ca9610N.exe

  • Size

    133KB

  • MD5

    232c59784d50a8ee5921bb0950ca9610

  • SHA1

    bcf404082073c4c007796f14ad02185fbd5facd7

  • SHA256

    980bd8cb442f5b771362babea4b6b1b9bee582569854a48b3f6c96eb4995b396

  • SHA512

    b5bec208708656d102d5fda6c136e567805022d2f7b6e5d3e8bcd3ea1f3bbd15741018af79cce017c8a48349cc285ee15f9716f0b596ba937ecf99c9cc9a26ec

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYRHyE2ncwEoh4WXW5lhyYrq+gykkQ4y9ctO:6e7WpMaxeb0CYjm1Jgqt+JkkDyX

Score
9/10

Malware Config

Signatures

  • Renames multiple (2873) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\232c59784d50a8ee5921bb0950ca9610N.exe
    "C:\Users\Admin\AppData\Local\Temp\232c59784d50a8ee5921bb0950ca9610N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    134KB

    MD5

    b1b97c3e71ab5bd8720211c371405517

    SHA1

    718a7a6ba9b3a9f77d31a917781f963b2ca5459d

    SHA256

    b85ca47b7723b3c0ab7f264739917c8c3beaf362649b373c69df4421d4679368

    SHA512

    3d35cfd86a0eba2375b685110f8de6a6f633ea172f56b1ed23ea10249b390ac0aa6b64ce541a252aab0c4cc81aec0a3c609d95aef05e054f83fbfcff6a7603d8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    143KB

    MD5

    9753f38ef8475188499186e6fdefd0cc

    SHA1

    339eca8358b25d38cfaaf1d68dc75b0b13d7df58

    SHA256

    6b0cff7c2787ceb6011fa311c0e492a070e897fadcd8e6918b49d8c4951f5a72

    SHA512

    580b461f19353806d20e04b39e4657edb5ba36d8d396038b1efb08548e799c4c7b40b4e133755e9ad89d82998706c4053261ecc71670e57da53c1a5b9751391a