Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 20:49 UTC

General

  • Target

    605009e003f31f05f726e28cb98a00b6085da817edb2630416e9f3679c2cc19bN.exe

  • Size

    46KB

  • MD5

    a4eab74696294bfd9c4d20ff570cec30

  • SHA1

    325eb0e75325268fd6a1dfa65fbaa85e44564481

  • SHA256

    605009e003f31f05f726e28cb98a00b6085da817edb2630416e9f3679c2cc19b

  • SHA512

    6e28a17a61f16f6d66435f7e8020b490b3e29b9806c90c8dcd8cf42a0f13999381c3839449d7a17e7914da655b4c161fc0e02e588711f5a6dcf64cd2541b2ac1

  • SSDEEP

    768:/7BlpQpARFbhNIiJwsJwdXo8/O0QJfo8/O0QJh:/7ZQpAplJwsJwdBcU

Score
9/10

Malware Config

Signatures

  • Renames multiple (3252) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\605009e003f31f05f726e28cb98a00b6085da817edb2630416e9f3679c2cc19bN.exe
    "C:\Users\Admin\AppData\Local\Temp\605009e003f31f05f726e28cb98a00b6085da817edb2630416e9f3679c2cc19bN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    29ba39be28b05c33d871d084b1bb3cf0

    SHA1

    00cd700c4d6226d1c58a9dc3b687453510ce7acf

    SHA256

    6efce9ac8ee732a1c4980edbbf6529444d22ffb8543c6f7fcbac0c5ed2919ebe

    SHA512

    cc5b2c727422623cf67a55ef8279a637c6bf5ffbcd7f9dcdd8fd5c1efa66bf41f26bb91bffac7677b79564eeb12c1f01f5bb4f9def115a9ff46af7a57d30fde3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    809c36ef9f070013a1aa0b7d443795f6

    SHA1

    9bd6d9bd2694373b119a742d48c38799aa7efc3d

    SHA256

    df98ab4b62661fa20e99196d20b0bc2036994d701af525fde08441b4afecc497

    SHA512

    46ba0e3bb9467e40bd4a4dc0e130b4fba734bae8b69f2a1e1b303b4f202e6ec9f4b69122febbc60741ae62fce78464dd44eb5999a1055cd1af19ca75a2397dbc

  • memory/780-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/780-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.