Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 07:54

General

  • Target

    5b36c591ec79c0732e40c9a33960c34860245217f513c66afdc61868da65254eN.exe

  • Size

    90KB

  • MD5

    8b2169ab7c5095c9681de94defcf4d10

  • SHA1

    0d5cb489f49b958469f3c40fcca748c1362db100

  • SHA256

    5b36c591ec79c0732e40c9a33960c34860245217f513c66afdc61868da65254e

  • SHA512

    819ceb5a497882931c97822e0d883b6ca3e484a4720be31b485e569967c323618ed0797a55f806476dd7375ec6b48abaee7d767019883ebbfde66596ac1b2b75

  • SSDEEP

    768:/7BlpQpARFbhiWb8naOnaBGNS10w2Yw2l+Y:/7ZQpAp/Eaiax1n+Y

Score
9/10

Malware Config

Signatures

  • Renames multiple (333) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b36c591ec79c0732e40c9a33960c34860245217f513c66afdc61868da65254eN.exe
    "C:\Users\Admin\AppData\Local\Temp\5b36c591ec79c0732e40c9a33960c34860245217f513c66afdc61868da65254eN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    ae7766deebf16845f8367861714b31e3

    SHA1

    be79c47dae996f25529640cc04b38023391a61d1

    SHA256

    c6456e009f077b2e65b4f09f4d051719735d8e00fde09db35541a80fcefd14fc

    SHA512

    ae1e565ef568af6a5829fdd1a81d6e52d645a8cf3ad4f1f3a9e9cbfdffdc3eb62167d5b4a2445283c62a8720234eae39c60c3ec71768c48cc5969466626b241f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    99KB

    MD5

    f13366c7f2669ff4e8c77bcd807938ff

    SHA1

    08b833b866f08c4fd855fd3fe62ccc4bd5199579

    SHA256

    e06ea4ed87af076a52c6cb839f80fbd01f68ba9c34dfe433bd6f88bf9d786c20

    SHA512

    3b8074e4e3fb46e5b3c2b691480dc8cb42e90bb9a4d02b56cc6db10d0d2d6fd3539dce5cd08db1a3b1c6098356e1226657dd1e4b09ca7818ce6cb5cd07b0212c

  • memory/1972-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1972-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB