Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 09:29

General

  • Target

    5e3c1635333756efc3b1cad649753e175c986284f748ff5c7e72d6a854a9d2c5N.exe

  • Size

    55KB

  • MD5

    ffa8b66f8c550173b920d5657d538f40

  • SHA1

    922de8387eb272ac6232429b09ab85f1f44eb056

  • SHA256

    5e3c1635333756efc3b1cad649753e175c986284f748ff5c7e72d6a854a9d2c5

  • SHA512

    3010de950b44f6dda845b7a1d918d58d6f0cee4ec17514a77ce27229b1f5932f93c43564c04c1df18aac0b7e4f077e5a5d77848ec9c23261dd988be6031c9bd4

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFkTfq9Tfq7h6hWh2hQ:W7ZppApBULcfpHLcfpyDc2ih6hWh2hQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3781) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e3c1635333756efc3b1cad649753e175c986284f748ff5c7e72d6a854a9d2c5N.exe
    "C:\Users\Admin\AppData\Local\Temp\5e3c1635333756efc3b1cad649753e175c986284f748ff5c7e72d6a854a9d2c5N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    0d4007403df68882bd903caac4532231

    SHA1

    b3eeaecd8e50812a1a48c095850605d8e669ff71

    SHA256

    d302ac7f367a07d92c3f31fc98929b04f80901563db3b18b958e60d227742f38

    SHA512

    11613e3cbc6f6e5257c347f6d629d33beee10612f178c747264b76865a1286d608365e421ee9934fedb87d9c098bf66627f5b0a4a9d0fd74d0c18a32d3f470f9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    28e4326d916b46ccaaa40903c929864d

    SHA1

    b6bfde509d2e0a648b500dd0cc7b6b14ed450827

    SHA256

    355b66c0c283f8ef22975f9181b30cc2060a043c0ab3987f76151c67da036097

    SHA512

    efd105c471fd00cb38565fb8180bcd0f851354b7e1382318d0ec99c24fddb7032db56b1f18607ae9360f4d875714464b7be2ed868c9dd17b02966510dce084a0