Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 23:52
Behavioral task
behavioral1
Sample
7c5cd2d87501d6699db84c3f0e4ed9b0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7c5cd2d87501d6699db84c3f0e4ed9b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
7c5cd2d87501d6699db84c3f0e4ed9b0N.exe
-
Size
58KB
-
MD5
7c5cd2d87501d6699db84c3f0e4ed9b0
-
SHA1
6ea284bc1910d2dbf437649241af6f0e9d347d86
-
SHA256
e75000e4a18d58443f7889154b5ce996c9b43401223bf1b82d646250829c5ff9
-
SHA512
fd6aaea77fed17f4abca65b96de423393e308aee8d2b31345ab160aa0975ac0b034144c23fe3ce2edfe92f059c58d0aebb15ca193edc1bc9a5d70d2c60627b02
-
SSDEEP
768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyQY3tvtp:V7Zf/FAxTWoJJZENTNyQY3tvtp
Malware Config
Signatures
-
Renames multiple (4651) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/2928-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x00090000000233c2-2.dat upx behavioral2/files/0x0014000000022936-6.dat upx behavioral2/memory/2928-910-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.uk-ua.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\es-419.pak.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019DemoR_BypassTrial180-ul-oob.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ExcelCombinedFloatieModel.bin.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\msoasb.exe.manifest.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipskor.xml.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Serialization.Xml.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationFramework.Aero2.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\jp2iexp.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Trial-ul-oob.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\tipresx.dll.mui.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\System.Windows.Forms.resources.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-white_scale-180.png.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\ms\msipc.dll.mui.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\msoasb.exe.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvSubsystemController.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ja-jp.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\WindowsBase.resources.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgeCalls.c.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\webkit.md.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail2-ul-phn.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\JitV.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\PresentationUI.resources.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\optimization_guide_internal.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019R_Retail-pl.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\MEDIA\CLICK.WAV.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\OARTODF.DLL.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\7-Zip\Lang\cy.txt.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-multibyte-l1-1-0.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ar-sa.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.Primitives.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_MAK-ppd.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-heap-l1-1-0.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalPipcR_OEM_Perp-ul-oob.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Retail-ul-oob.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\offsymsb.ttf.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Numerics.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\System.Windows.Controls.Ribbon.resources.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-file-l1-2-0.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-ul-oob.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Retail-ppd.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.scale-80.png.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Common Files\System\msadc\it-IT\msdaremr.dll.mui.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-processthreads-l1-1-0.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\asm.md.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Trial-ppd.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\concrt140.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Reflection.Extensions.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\Microsoft.NETCore.App.runtimeconfig.json.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Java\jdk-1.8\bin\orbd.exe.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Ion Boardroom.thmx.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Retail-ppd.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-core-xstate-l2-1-0.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\tabskb.dll.mui.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgeCallbacks.h.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\XLMACRO.CHM.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\gl\msipc.dll.mui.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_KMS_Client-ul.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_SubTrial-ppd.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\7-Zip\Lang\sr-spl.txt.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Windows.Controls.Ribbon.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\System.Windows.Forms.Design.resources.dll.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00E2-0000-1000-0000000FF1CE.xml.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_OEM_Perp-ul-oob.xrm-ms.tmp 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c5cd2d87501d6699db84c3f0e4ed9b0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD511ac99a91e8a714a0bd1c431fa888d0c
SHA17c0874f466ee43d058e7c2c493582dcf3f4a3412
SHA256047f0bba2f86f3606637bc4a626e66bea29c3ad285df9263369daa73758ac876
SHA5123dead9923d5a1d05d22949d16cda4a1908979c833fac5c238c1704e4644c2b20caa36ca474f30807785f6b5b73f99e6d30ea369a2d4d8f5f01285e52a7b3fdd3
-
Filesize
157KB
MD55f3a9fddcd155398e02be0e1b6b8e937
SHA14e862546006907cd4ada2968d20043f5ce8e7a64
SHA25668eb58f8a157fc093482bb49ae92f9be9a97ef87967d3d95048b66e3952fa72f
SHA512e33311039c93cdf2110c11a3cd5c11bfe2e8907a44d7e7f5afe7690288d38642f001f626288063e66fb6f51a325929ad5d5fc7b98e64c4702cf0da2484efe392