Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 11:02

General

  • Target

    55ce9000304badb78409e6f0000e009e248efcc53fcf87e6ded7d596b4f2514cN.exe

  • Size

    47KB

  • MD5

    1ca564ea5b4bad35f6ec2cd26f103150

  • SHA1

    f7276d74a053fd0b8cb72773f3ec1ef321ffe1be

  • SHA256

    55ce9000304badb78409e6f0000e009e248efcc53fcf87e6ded7d596b4f2514c

  • SHA512

    744ffea6b239957e07eb6ad43c5650d39737f5cf9bd3d9ea57328a62318a35827554bec807142f2fa51026193b1df2b227ec86961085e61e1aada9a5b9f79bb2

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42Lcfpb2N231F1itvtu0Da0DT:W7ZppApBULcfpHLcfpSo3fstvtu0Da0P

Score
9/10

Malware Config

Signatures

  • Renames multiple (1201) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\55ce9000304badb78409e6f0000e009e248efcc53fcf87e6ded7d596b4f2514cN.exe
    "C:\Users\Admin\AppData\Local\Temp\55ce9000304badb78409e6f0000e009e248efcc53fcf87e6ded7d596b4f2514cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    a320247b963e180b440fd0fe7ac1775e

    SHA1

    efea2e8ad850cb95d16dc21f47f5b1bde6c70cbe

    SHA256

    df567a10912dfd2f87db7c911fe2beff5127fc04e9a8e1d6b41ba2bae792c067

    SHA512

    f2c079620bdc48aebac25889c5fa485d512ffd27633fb59cf13cbc807a01cd059b1fcf33741a47da9a4da97525100a96154602e590c09fd81fd80af498df60da

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    9593dc41056e2822e49847b058f70148

    SHA1

    15fa8897d609ebb624de4f1390f6d9c3abc6f9bc

    SHA256

    d13b1ed0b1bdf14a16c9f8cc0e3809e917afe87b95b03de9942a4fe7c31d0aed

    SHA512

    264334dbb40d6b9b09780e9b432cd33a38a4d1b67a3a27c40ad934e2b944a36c14b3a5eb595ef07b8836f2e09435084ceff62074bafced959276af85985863ce