Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2024, 02:18

General

  • Target

    b4d5d1a6f5cc52795c57dccdda3a8a632457e3b8b7abdcc297efb40748a280a4N.exe

  • Size

    81KB

  • MD5

    1c2d27876fce3f03da87a82065acd870

  • SHA1

    a3f7a0d3270c171899eaf8f95790ff4c4fde8c82

  • SHA256

    b4d5d1a6f5cc52795c57dccdda3a8a632457e3b8b7abdcc297efb40748a280a4

  • SHA512

    ead9f214a9c46449de2caf296d6ac60856e984831d081eeb656589b041558fc6e18744c6bf94cb6fd1487e243181b7a574d24fb45c9df7c6f34d5029b98325e3

  • SSDEEP

    768:W7BlphA7pARFbhvOsTKnKqtb4HBZjlwGpCYnigugqOzM9bdifwMtxEwJjlVki/7:W7ZhA7pApvOsOKM4HBhaGwOQ54xEIjll

Score
9/10

Malware Config

Signatures

  • Renames multiple (3107) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4d5d1a6f5cc52795c57dccdda3a8a632457e3b8b7abdcc297efb40748a280a4N.exe
    "C:\Users\Admin\AppData\Local\Temp\b4d5d1a6f5cc52795c57dccdda3a8a632457e3b8b7abdcc297efb40748a280a4N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    d792017d134bf77fadd35a5f0c8924bf

    SHA1

    01c7b004c606d1ec117618e0377aaa43f486334a

    SHA256

    53a2b50ac9ed16c801d60a58df5b2f36fd284a5b78a48cfa997c1e549d50a358

    SHA512

    59e3309fba2ab76d744cb1920b278492609ad4e45467b1c37114fd30cdedbd7bfcbcec2e331be3fe7c81fe9779702659b02ade190bb252ed95189aea47205187

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    90KB

    MD5

    6a93fbf7488d823e04807418fc258c6b

    SHA1

    d6dbc8819e1a55ffc72e3a95a55dd97d525e74d9

    SHA256

    c09345887ae2507d508b10b5b7c41d6208ec2c5c210c7d0f59f570b82f40490d

    SHA512

    22c97de7818e52c82ffde58930aa5e26e9b221abd583cc3d4a56d74d412ff9d6de7481583964c4beb0037850228ae81a7a964e587462d6998d898bf8999fb2a4