Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 04:01

General

  • Target

    5201dc7a82b2f17268b50887161a59d4e7af159f24248141473ba1b2f866bd49N.exe

  • Size

    40KB

  • MD5

    fb39c212c64083d4dc8a65cb2d8fc050

  • SHA1

    36ffb71d0be7eafeabbbe2325c9e517420385b3e

  • SHA256

    5201dc7a82b2f17268b50887161a59d4e7af159f24248141473ba1b2f866bd49

  • SHA512

    6be595b3a7e0ae8b996649686bc50750ab15e2bea5cda0bfa5a9418009703052c9e0109de0344f5b97c136c4e7d76942029c3e429b90fa0a5ce0c5c90706f8cc

  • SSDEEP

    384:GBt7Br5xjLdbAAgA71FbhvU8g0U0fLMzyKbNzzyKbNWkq3DLXakq3DLXa:W7Blp+pARFbhBgnKLMWK9WKD2N2a

Score
9/10

Malware Config

Signatures

  • Renames multiple (339) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5201dc7a82b2f17268b50887161a59d4e7af159f24248141473ba1b2f866bd49N.exe
    "C:\Users\Admin\AppData\Local\Temp\5201dc7a82b2f17268b50887161a59d4e7af159f24248141473ba1b2f866bd49N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    4bebbb48a49ff25d9e6fb9280682b13b

    SHA1

    f12ae27265e9925f419c029c2844d375bf200993

    SHA256

    0524e775ed03ced2b6c7c95eda70ec98d5a3861dea1be708b7e50ea0a2560baa

    SHA512

    770b86e9341f7d675fb3f9b54e20c391c8790ed4e08676475a894d9a06ea0f1b3be6d14be8b0ba7053c28f8f568ff10d4dfd72a59f673cf36d7bf05f375c1d03

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    478dee6c80bef2762d43c63d6004f72a

    SHA1

    2d798d79fa90c1937a56e9ac046d2e44e0b7e779

    SHA256

    03fd72f8bb667fd2df2c6f68e53f677316b959ec1b4ec7af8b496ea84f5aa9fc

    SHA512

    62a8a4683d2ea9e140eb7b630e5069c3b6988a9c65c1d99063ef5edc09899b188b99b2b028eb8a2c4385c14b13baad4f2b4d5cc564e37dbae31efbc441b50e43