Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 04:33

General

  • Target

    86c6646d2f23b56cbb8bb7f8f6d9f050N.exe

  • Size

    47KB

  • MD5

    86c6646d2f23b56cbb8bb7f8f6d9f050

  • SHA1

    ce5aded5d768674922ad9835fb22034643c2fa65

  • SHA256

    ec7da469d374cc7fdcf80d0114994e581b12ff011c1b33bceb9228cd09d6d566

  • SHA512

    e490ad40cbec0e7f9d9af05ab6bcea1480500c4a4f2deab4a952a194c7890de95d42a21fbf9ccf4c1c224a0982902bc78abb470ea30471d166fc18f4d69aeb29

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLNdyGdy/a2al6A2k8g:W7ZppApBULcfpHLcfpyDUdyGdyA2q

Score
9/10

Malware Config

Signatures

  • Renames multiple (3125) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\86c6646d2f23b56cbb8bb7f8f6d9f050N.exe
    "C:\Users\Admin\AppData\Local\Temp\86c6646d2f23b56cbb8bb7f8f6d9f050N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    71837e1c3caa0a15b88ece8bae1ad2b6

    SHA1

    44936c9b15cd1058afcbe3fbb18bcb25d2ce498a

    SHA256

    4a0bbc7fa5da06b4dced7ec5bfb35359bf0282f80f3841afab51f5c1c7853e62

    SHA512

    61885ab017073c30d5956b646d1043e72e0826034105a62cb88bd1ab352361baf03fc0481d938650fd228289c23832162dd9bbf921ed59cf3ea7ec8ed244b21b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    fd49ae918f88c84584f7d9269fa23bf6

    SHA1

    89ea5330a79278a5d890bc2255c25a59baa89c66

    SHA256

    3f53051663975f095ab8398757eae2cbd885b2ca3dbf0f7cf1201ddbd569a6de

    SHA512

    0d632ada159d83bae9d3d50e7591a307cf8054fba7563117d3eaae746316393d7a52f137af6221a3a7c0d63721397810c15ac525cfb42cec14f1a5f7abfdc0a1