Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 02:23

General

  • Target

    acc9e144e81314d70f5f1c6adccbce10N.exe

  • Size

    45KB

  • MD5

    acc9e144e81314d70f5f1c6adccbce10

  • SHA1

    a1754eb84c1c0854daf8a7828f9ff3cf7bae56e6

  • SHA256

    ca0e3aa6ef84b5fd5aa03d066b8a74727a2e304df26db3a8d783668e7ce1eda2

  • SHA512

    220cd44a453edeedc2ee02c6411be299282ee9350d2a388dbcc4103cc320456380914750afd3ec808253ed947fa9ddb3e295a21d635f3707f87724123388ae35

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LORWAnWAkpUE5c5n4fZ9Z34fZ9ZE/:W7ZhA7pApM21LOA1LOrtkpt6k

Score
9/10

Malware Config

Signatures

  • Renames multiple (3189) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\acc9e144e81314d70f5f1c6adccbce10N.exe
    "C:\Users\Admin\AppData\Local\Temp\acc9e144e81314d70f5f1c6adccbce10N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    4de281b02db41c99d8a7a395e5d6673e

    SHA1

    94411d911b4f1f43c5fe768dbdc723c1208fbec7

    SHA256

    591a69b38f306cb1ab57cac7125172b740dda47f2fb8cac14bb84b395396fec8

    SHA512

    08f10b00955ebcad614a007677fceabc4aa19b880f359426fdee95d647b88400816f1e94cff5c31c9e7b6364601dc1bdd890dfd065aa28e51ab7c0ed8fdc85a9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    9c9f22ee6e893cec936afc2a41d1f061

    SHA1

    6b7722c6f8439e487917668948997cff135656b7

    SHA256

    f469287fb6c07b270bcbcd3b702bdc81f86747a77c3391a78d88503f1f0d8f3c

    SHA512

    84e836f73c80d52de6c2736f33452c1f00918d5e9f1559d600076336d2b71406ef39d64aeca580b17d8c8a4795038c35c8e4a71ac9e93546cc3af1a48bf8879b