Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 18:36

General

  • Target

    4390850f2de81afffdd1e0d84e5086b6842d2b94373733e63b60bfae138b51e8N.exe

  • Size

    80KB

  • MD5

    fb1eaadc22a74e3f4b613103b8d64860

  • SHA1

    f20a61c99358c7ea6cc2f283d2272f22ec938782

  • SHA256

    4390850f2de81afffdd1e0d84e5086b6842d2b94373733e63b60bfae138b51e8

  • SHA512

    cc0298efff5b0f367f82e9b452292561b25c01bf27f3437b0854a19c1e5cd8f1adb50315edf62ef139065fffe1def90935d393d26b309eeef8f02f21ef35d9af

  • SSDEEP

    1536:W7Z2sspApkZrZ4+fU7lK1lKT8/8yNCNzdwEbdwEZ:62ssWpcU7lK1lKgkZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3263) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4390850f2de81afffdd1e0d84e5086b6842d2b94373733e63b60bfae138b51e8N.exe
    "C:\Users\Admin\AppData\Local\Temp\4390850f2de81afffdd1e0d84e5086b6842d2b94373733e63b60bfae138b51e8N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    92f1034a2a4028fe4920da5e35934fb3

    SHA1

    92768fa494e8e6b0288a3852ef4545f95dec72b2

    SHA256

    5df6d5e0578a8e0d9e19a36e7c66606ff930e6db7960c59ef0a472f2dc31b1c7

    SHA512

    2449019559b7eaabe0fd9667fa6f87907c728527d92979343e585a3e36592930bcbb95ba0806236525c85825e1e0f92f76d5e14ca634e74589f2859162ef2e73

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    6cfc7cd7ef46a646e3f59b3bf2ca4795

    SHA1

    efe04a2e4538569d98b7f3abcb8d70debe1b4004

    SHA256

    ffc25153259e214b5115ab312eae879461909e9204fec9eed369d5944493b4a6

    SHA512

    d04a4d28c56348566f09eb13034b18796ea5d86075f3883966380815b5efc319f6b11835cc2792ac8fede421f046f27deeda46d10118a495c22b078df8688e8a