Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 03:37

General

  • Target

    2025c3e03a29cb23b61b58792c95dfb0N.exe

  • Size

    44KB

  • MD5

    2025c3e03a29cb23b61b58792c95dfb0

  • SHA1

    24d7e83d36f5bfd915baec364f62a0142d36da27

  • SHA256

    e15e7fc70a4e57b6e95cce5ae6495a9d9cc08da28509966077d59688f9b03515

  • SHA512

    ff94d2a9d34c99af8fb8592e4e7d9de12c38e67b99d12ba7427ba404b8da54a8d2488027725094b16fa46b8e84d5b31a0f3c03a9a22616f8d8970fb65903d229

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LORWAnWAkpUE5c5n4fZ9Z34fZ9Z0:W7ZhA7pApM21LOA1LOrtkpt60

Score
9/10

Malware Config

Signatures

  • Renames multiple (3319) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025c3e03a29cb23b61b58792c95dfb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2025c3e03a29cb23b61b58792c95dfb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    4c17c2821016461a1ff8e2b9916be672

    SHA1

    1b669a922cee09a44fd40a33c63f4b3ec571b8ab

    SHA256

    cffbb9f9395edc1709bca50d62843070243f8c0a76f6acc164dac0bcb118efad

    SHA512

    f84a18533cc8a9094ac263e4ccc25f95b48cf6cbfd48cf371566560b1fcf44e2f2ff2ea0a2b6fd88f8ab1efbd224cf24c33a58c0754a09b25c59310fc53644d6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    f2c8589b27211e5c1fe2279454eb04ad

    SHA1

    9a50f33bb359ace4214bf736dfe5e247411aa6e2

    SHA256

    ce5d83a05e454656f4de5d1287acbb119e1b06d42362f78b5e0d81550a5d3dd4

    SHA512

    783dd04d40c215f2d786b0aed973014b4d535a8b26857107b34f25dd1183e34fafe70a74139812baf61d1dfea253d166b3b3d6acc19357a621b3c2bb3d584f64