Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 12:33

General

  • Target

    cffc7fce6a078b0c7e5487f2397e5790N.exe

  • Size

    57KB

  • MD5

    cffc7fce6a078b0c7e5487f2397e5790

  • SHA1

    9ca1158c703cc06a789437b860f7ae6759c88bc0

  • SHA256

    5cb3188422454df237c2793c39032b6ae47f68198d0f039aa01501eff69b0f24

  • SHA512

    c68126d9e1190d1ef6c0a6b8c195d7219101cbada7e98c0883cb91cd6a1dbdba0a25cfc17d478dae44fdfdf18f2eeda9d2e90512183bbdd6a1cd29c97d94cd5b

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw1VyjVyfxAkJhxAkJl5H5NbJtZbJtt:W7ZppApyVyjVyv5H59Zt

Score
9/10

Malware Config

Signatures

  • Renames multiple (3206) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cffc7fce6a078b0c7e5487f2397e5790N.exe
    "C:\Users\Admin\AppData\Local\Temp\cffc7fce6a078b0c7e5487f2397e5790N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    d34a8d11c382108a53cdd9ac16703b96

    SHA1

    67869dc20a2e47442be2596dfce18fdd97c99322

    SHA256

    8751e21822d256e53f65f9e188b49ca3bbb25580be1161a421e59dc19e993e21

    SHA512

    8f264e2cbe0caef2b42ab36c6915b107df25f009765af80587f396a00a61f0c40f49cdca586492739ab1c5aabcf749d12df4af77bd5c37053e29738f42cda1b3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    892eb6a20beb6f5eda6bc4d957764715

    SHA1

    871a1c4140df04e0ecf3996b97919d510223408c

    SHA256

    df852458701ee4606783267f00c76abce288e492177272b66bfd183e5975ea83

    SHA512

    3d3d702cf1d42426c8fbfaaf15889e725da3e82ab03cf4848cc3bacc95bda05831e77abc24e5a19381a4e98e9c73aa852b74337583d0aa6e34268e0c5dff4a30