Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 01:57

General

  • Target

    4662244910ed9ea2b13cb1a907c444b0N.exe

  • Size

    48KB

  • MD5

    4662244910ed9ea2b13cb1a907c444b0

  • SHA1

    393c2d5ed6ef905226974384be33da056ed469ba

  • SHA256

    312aeb6d2e836a6bdbb4a9bdad1b31691e8dc5516aad98b36d4d3f14c5711b85

  • SHA512

    87ba46c1ad1c81aa172a5878c7830a2fb68a602863cc3010ac5bb010e670d86e31aaea8064acef96ed6d103d467f6ac5652be9608d40f84390f22f5488bb34e7

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5ltIIRIy7Blp:W7ZhA7pApM21LOA1LOl6Ad7Z

Score
9/10

Malware Config

Signatures

  • Renames multiple (3243) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4662244910ed9ea2b13cb1a907c444b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4662244910ed9ea2b13cb1a907c444b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    04a6312bc63b8d8a60517791d5c83e6a

    SHA1

    bb0ff503e410b5285ec4f6239465523dd60542b2

    SHA256

    c91ea030ea2aba10892cfa1d907e9063e027939281a85d57e43013d0e0f32482

    SHA512

    c7f688c7b9450113706a64a51818659fea934cd5feaeadebd9fa61323b2bb3f5bbf51fb5b95d4d6ab216ca82f36ed72996566e9a7fe91b5bfef086aa678c1748

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    795b8c4b30bdc3cf79d4ca9ccabf02f2

    SHA1

    446fb93652fa32d05eabe248052bff43f3590e75

    SHA256

    d803bf1fab53de70c8c67a697ccd319bf497e519c3eb9675a99b89e1e5b8b973

    SHA512

    59b9ab1e77a1b9c0b72c9df510d912becea6eaee028ab8aa4865270c903234459d65d153457d9160818d063708f64daf6d33424fa55dc0be9b5613ccda39d23c