Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 11:46

General

  • Target

    7b4c57a1bee0322873ecd51d187cea95a2587fef12ea6f9b32ad44cb2ed8726aN.exe

  • Size

    48KB

  • MD5

    f68197e80e344be32160d4e38542f480

  • SHA1

    cef11c3b0d0818b99fb832f42e6493331fca500a

  • SHA256

    7b4c57a1bee0322873ecd51d187cea95a2587fef12ea6f9b32ad44cb2ed8726a

  • SHA512

    ca9fe143f25eeab54cdef5d564b1595ccbdb39456b01b0e9cd72a1381242128b8a6f21f469ee87dd46a2670d4032d59a9db37ae61142f77678d8ccc073676949

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42Lcfpb2N231F1wbZUnUk:W7ZppApBULcfpHLcfpSo3f2W9

Score
9/10

Malware Config

Signatures

  • Renames multiple (3315) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b4c57a1bee0322873ecd51d187cea95a2587fef12ea6f9b32ad44cb2ed8726aN.exe
    "C:\Users\Admin\AppData\Local\Temp\7b4c57a1bee0322873ecd51d187cea95a2587fef12ea6f9b32ad44cb2ed8726aN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    23e445909a3339d2cea4a7235510a3ca

    SHA1

    1b647d3e5bc519b607e8637a666f19d49a313deb

    SHA256

    302177734b657aa246ac4cb4264ed43b4765cf6608e1cc6acc5db4ec3d253ac3

    SHA512

    a9e53519cf2dd8c297b61c9b621cc93874a8a00d63fdc18a0834e308996ea2002ed0841c0b8e8d9bd1d77b05a44db40996f95fa3c4d0d3b31de02b73d2f53668

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    e78e88b4d69e9d6c82fdc36ec7c4b0df

    SHA1

    3313b847a49291e531157912c5534e25a5c0e9ac

    SHA256

    b6aad0129cdf130dcc04f0918cf3e658c3326b76d77066dbf6757772e4b3b0f8

    SHA512

    5e4c9de9b02aec4f6101f2fff22c079982bb9aff2aa1970d8d2154e1edafd4b08fe11e7e084af93d2569b73d432169a62d9e28e938b54690e8b8f297352bc6c8