Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 02:26

General

  • Target

    e53f22a0c6665987b90642f84f5da54bb45ae7a716c4e7cb8270075cde791c00.exe

  • Size

    64KB

  • MD5

    425360dccfe019fb714ddf6906b4116b

  • SHA1

    3ce48a4ce5c35ca4bbd3d49cad98887f87918d2d

  • SHA256

    e53f22a0c6665987b90642f84f5da54bb45ae7a716c4e7cb8270075cde791c00

  • SHA512

    7b7f6a76ed9e12a0b694e8d0cc2089655d198098865630c312fdb1ffb5ec98c595553ef4ee8ff1ad5c5e749dd7d4ebe2bee1493443e2ab390d26687a454f4978

  • SSDEEP

    1536:W7ZppApBULcfpHLcfpX2/Nw/Nwmxmw1we:6pWpBwchcV2Wxmw1we

Score
9/10

Malware Config

Signatures

  • Renames multiple (3701) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e53f22a0c6665987b90642f84f5da54bb45ae7a716c4e7cb8270075cde791c00.exe
    "C:\Users\Admin\AppData\Local\Temp\e53f22a0c6665987b90642f84f5da54bb45ae7a716c4e7cb8270075cde791c00.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    64KB

    MD5

    63f559181d18dbb29fa0071c478a415a

    SHA1

    6e8240b226d215994e056f7044b5154ef0863c32

    SHA256

    d1a9669f568096d35239485a7eb0ae216fb52f79e77edd74deda5c2d3da83125

    SHA512

    ec00ab258f8b4ddd004a9f8e528b07f70745ae4b90a51e11c22705dc24d5f1113ea2aaea0ad0b08b5bcb0da0c169aa345bf3eb7ac904a47670cd7d4bf78b3a59

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    73KB

    MD5

    c27ef40d82bc0401eb4248e5be6ad6d9

    SHA1

    605dbcb923b988533390e4c6630e8adcfe1611d6

    SHA256

    c5329bf907b003b818aa80f8a13b8313cd9d35398eb62035567a9811a0f40b41

    SHA512

    099e505be4aff8e3a205a4bcb2c87baa9323a2bdbd51576cac3413de3af1c189e93ffb304499dc59a83d4daaa5e81afeff7811cc88c616fc8deaa1e1b9c9f161