Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 02:20 UTC

General

  • Target

    4c427756c773cccf28639dcd14bc66e0N.exe

  • Size

    65KB

  • MD5

    4c427756c773cccf28639dcd14bc66e0

  • SHA1

    587cf9ed08ca2c0cb7b5eea7db073dfce028f970

  • SHA256

    277dbd928dac7f085e2d9edd8de1ac164f0576159733b922e28f73cd385234f1

  • SHA512

    19b42b3504874761caaf0e9db9d02573119e5d8a448766ac8138786f3e473545b61482da2a37147a2d2946d94cfce575fb387d112e242aa3685326b765b4a6c0

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpVF/MF/3Nw/Nwk0cEMdV8IEMdV85/8O0O3:W7ZppApBULcfpHLcfpX2/Nw/Nwmxo

Score
9/10

Malware Config

Signatures

  • Renames multiple (3164) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c427756c773cccf28639dcd14bc66e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4c427756c773cccf28639dcd14bc66e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    66KB

    MD5

    0894f6ffa4e6b90419c3e85463e78d50

    SHA1

    083b2c6b9e23677ca855f67bbd187cb088886b3b

    SHA256

    b525b4305dbd538fab531f4d8343b1bacfd2db20cf298d92730e22aeedc371f4

    SHA512

    cc286014fd2fbb7b52efccd3b6be29c7ce7f3fafec0e9782767397b3c3febd919009f4ae82864c9982994412daa455e8743114561a415eeffd5b00539718806a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    74KB

    MD5

    998700544920e921377dbdefa53b11c7

    SHA1

    1f64ecbe1bdb10642671745a677f2b5f8ab8ef7d

    SHA256

    5c51d2cb505b1ebb9bd30d01b30d0ba22ab1ae43403a34d0a663381e6d0c1b36

    SHA512

    f718c4e1da2530fd7bfd63cbc94816282aeb6c3cc2c4f477dbe94ef7973781907691b3a3f782cfeb4625dbbd098f1c032ce65b25bba66e38f5cd35c91cc2454a

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.