Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 19:58

General

  • Target

    1ea878107c4811573305907573d45a5d61cdc6d52d779dde4024122bb4776a27.exe

  • Size

    74KB

  • MD5

    9c2c4b45a9b4c4e06c53c314faf715cd

  • SHA1

    2c1350442c107c52d078587f46d88cc3606502ca

  • SHA256

    1ea878107c4811573305907573d45a5d61cdc6d52d779dde4024122bb4776a27

  • SHA512

    4d21d7ea1a5122ab54f38e078e3af3b229e19a051c60ad6c927fc031c1fec756b8d7fa42ead2548b31be8769ba8eb7842382f9199e3bca1b8253a17d012ccbd6

  • SSDEEP

    1536:W7ZhA7dAZ1++PJHJXA/OsIZfzc3/Q8+CtlYSDL:6e76mQSostXDL

Score
9/10

Malware Config

Signatures

  • Renames multiple (3481) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ea878107c4811573305907573d45a5d61cdc6d52d779dde4024122bb4776a27.exe
    "C:\Users\Admin\AppData\Local\Temp\1ea878107c4811573305907573d45a5d61cdc6d52d779dde4024122bb4776a27.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    74KB

    MD5

    56c7f06f3ca7dc51e043b11bd87f7872

    SHA1

    a4532e26eb4d4dbe9be34b24aeaebd9e5609c4c1

    SHA256

    5c9a0771603bd5d0a78674d1324801bc04b83088012a16028d0443edeb197734

    SHA512

    06abbeb3de696c727eb7f95bb0bea259f2a0ce89ed7f72d9308a9d4a0bc10f7584af8c4341105bf3a83d88aedd74473b11cd4be54c158b29693d663da4f343c6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    83KB

    MD5

    295581ce7105463b0d5bf2d05339a482

    SHA1

    56605b1ecf7cca617760bee591527c3da6c90a95

    SHA256

    441c2c5654d40338b9c0f98ad74ae713c24a05d798573e313282f3141b87f2ec

    SHA512

    6865878083aed50e0189546f7d342822fdfe8c7fff2d6a8388162fb0216f3eb5023761bf85e9042db9a26abeced373c8a235d739dd7accd115e250a7e6869578