Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 21:41

General

  • Target

    250a5db81e5b9967a224aef1fa07902866238ddc1f7801491d923b7c0ae7abe2N.exe

  • Size

    91KB

  • MD5

    a6e1c1f299a11ba3bb8dbec1b906bca0

  • SHA1

    5f80da807601ce480cc147507b97cb965698c74c

  • SHA256

    250a5db81e5b9967a224aef1fa07902866238ddc1f7801491d923b7c0ae7abe2

  • SHA512

    94da5e8f0237dac6f1f56ba8b8600fad9435f3e005b770a60d78e7f946745ead5060a3c6b00e42cd02926f8c133023d8bbc7abe254bfc434295399bacd17ce94

  • SSDEEP

    1536:W7Z+pApfGQ3y3RWvfmRfm9sKsSd53tjWC4Z2p:6+WpDfmRfmhHtj94ZU

Score
9/10

Malware Config

Signatures

  • Renames multiple (2894) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\250a5db81e5b9967a224aef1fa07902866238ddc1f7801491d923b7c0ae7abe2N.exe
    "C:\Users\Admin\AppData\Local\Temp\250a5db81e5b9967a224aef1fa07902866238ddc1f7801491d923b7c0ae7abe2N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    92KB

    MD5

    5759e2b27f3abbbc399df9839d4b31a1

    SHA1

    f13810b45a742e3f25d45fdce45f6beba48945f5

    SHA256

    81d168697960aceb5e05fc05d14d24b9d07fe7a8c6c7f15bfafa6b8f9378d554

    SHA512

    d81e038075a919832d09dcc717c5ca1fdc5f632dfcf51326dbc4a5d2ee68e35ee311fe3df766618eb93e364045dc8c9809c7cb7f70ef96f799fc9048dc768c16

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    100KB

    MD5

    20375ac34c488791c61ec83ad99c9e52

    SHA1

    f9b3ccb70eadc2489c6177972946ff4b11a0a853

    SHA256

    37f805e64770fbed020e5855a97dfe968513281346dad1c2796e3e7eebbe6b51

    SHA512

    ec284f5f97a9163c8790cd997b58a4a84224f4356cefd75da613815f2a2cc7854612b281061e86c0f7a0a22f492338f652b033881b86a92bc4e6e83f8c051c68