Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2024, 02:39

General

  • Target

    e11018210b56b8a99f392d68cbde4274171f138892b2fe9c6cb1c3a09e81d7b0N.exe

  • Size

    70KB

  • MD5

    552ff5ce9e7c20f33e45d8a7d796b500

  • SHA1

    d9f3a2590ed2470e85c709ede4c065f1de7a4931

  • SHA256

    e11018210b56b8a99f392d68cbde4274171f138892b2fe9c6cb1c3a09e81d7b0

  • SHA512

    5e855958e853e85ee354306944e73ae01ca4c2b364f6d240e7a5b46fbfbf4b76c030ce92596f864549e8c97b97a527fe90f86031acf3dfba3beeba506d1ac428

  • SSDEEP

    768:/7BlpQpARFbhvEXBwzEXBwLtAc7Fc7u595QUhUey5vhgCy5vhg9qArJiqArJ1:/7ZQpApHou595QUhUBgtgO

Score
9/10

Malware Config

Signatures

  • Renames multiple (597) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e11018210b56b8a99f392d68cbde4274171f138892b2fe9c6cb1c3a09e81d7b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e11018210b56b8a99f392d68cbde4274171f138892b2fe9c6cb1c3a09e81d7b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3692679935-4019334568-335155002-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    eb2671ba906ede6d7db334f614e22e57

    SHA1

    a281f5d0de6bb58be6a6a1db5750302aac9328d8

    SHA256

    6e2fa3ebda6f78aadc9a557a14f17fc26049e1986c1c6a12253a817057e0acb0

    SHA512

    7093fac570a25dde6e4446a4230b2fa1ca878561bb9bfc4065d56375ca326376c78f865ce4302ff5487bc26e930c7b807a70861a6bb05232186c37bcef2c719b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    79KB

    MD5

    64249fdebe228cc53f2a0d0ef9cdd018

    SHA1

    35c33c97c4faf1fc305c7cee6993e8c301059821

    SHA256

    e88d3cea98f1dadb243fc2cf520b29168840d3a9c03db368a0a1dafb880258e8

    SHA512

    28d560ba14cfe1d54e251bac56133a031b6565c29b6a14e6f19d1c802e0be32d6269e51a27069672ffd4e7ea5a32c6eaacb258f527963a7ed462dcdbb0f54e5d

  • memory/2244-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2244-22-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB