Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 19:16
Behavioral task
behavioral1
Sample
04ba92c4ddd031dc5903f0342ef7ea00N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
04ba92c4ddd031dc5903f0342ef7ea00N.exe
Resource
win10v2004-20240802-en
General
-
Target
04ba92c4ddd031dc5903f0342ef7ea00N.exe
-
Size
76KB
-
MD5
04ba92c4ddd031dc5903f0342ef7ea00
-
SHA1
1f61cf24455f19d210c862578488b802c0cc304d
-
SHA256
b5b56634537106858b2bced859da3d71afeeb5b9401dea6907c1f76f763c1c04
-
SHA512
dfc8c39c18bb72ad415290806c7105da2742dc3c0aeb6eeca39dfb0b593f03ed5a85a0b44cf59bf6c72c7f361f214e4040e45654c95d5087c3992a44ad749eb9
-
SSDEEP
768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNy2/mepYXwILQC:V7Zf/FAxTWoJJZENTNyavf73tQqu
Malware Config
Signatures
-
Renames multiple (4360) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/4500-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x0009000000023564-2.dat upx behavioral2/files/0x000600000001690a-6.dat upx behavioral2/memory/4500-808-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription3-pl.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_OEM_Perp-ul-phn.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\VSTOLoaderUI.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.Requests.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_OEM_Perp-pl.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription2-pl.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Common Files\Services\verisign.bmp.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\Microsoft.WindowsDesktop.App.deps.json.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\java.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\7-Zip\7zCon.sfx.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\mscordaccore.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.Cryptography.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientOSub_eula.txt.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ja-jp.xml.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_ja.properties.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcR_OEM_Perp-ul-oob.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\UIAutomationClient.resources.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\System.Windows.Forms.Design.resources.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\WindowsFormsIntegration.resources.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\oskpredbase.xml.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Principal.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Java\jre-1.8\bin\dt_socket.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\7-Zip\Lang\ku-ckb.txt.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Windows.Forms.Primitives.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\prism_d3d.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Java\jre-1.8\lib\meta-index.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Security.Permissions.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\PresentationCore.resources.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-0C0A-1000-0000000FF1CE.xml.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Memory.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Document.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART3.BDR.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Trial-pl.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest1-pl.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp4-ul-phn.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\client-issuance-bridge-office.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\System.Windows.Input.Manipulations.resources.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Trial-ul-oob.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\TellMeOneNote.nrr.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Office16\BIPLAT.DLL.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\UIAutomationClient.resources.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\jcup.md.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_ViewOnly_ZeroGrace-ul-oob.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\STSLISTI.DLL.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\sqmapi_x64.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l2-1-0.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\j2pcsc.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\java.policy.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\LucidaSansRegular.ttf.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-sysinfo-l1-1-0.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Common Files\System\ado\msadox.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Internet Explorer\hmmapi.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\sql120.xsl.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R64.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\VisualElements\SmallLogo.png.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\bcel.md.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_KMS_Client-ppd.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_Subscription-ppd.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\System.Windows.Forms.resources.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\System.Windows.Controls.Ribbon.resources.dll.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial4-pl.xrm-ms.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientLangPack2019_eula.txt.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub_M365_eula.txt.tmp 04ba92c4ddd031dc5903f0342ef7ea00N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04ba92c4ddd031dc5903f0342ef7ea00N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04ba92c4ddd031dc5903f0342ef7ea00N.exe"C:\Users\Admin\AppData\Local\Temp\04ba92c4ddd031dc5903f0342ef7ea00N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4500
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4152,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4300 /prefetch:81⤵PID:3640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD578ee910fb83350fad2815d41ef9f603b
SHA1f81ebcee2089af0b165e4b62516438439f7e1f15
SHA2567e404ec08104c346a9aa2b10afb6977c25081afad5e232d634db5f7db3ae68a0
SHA512169239eae50684f50015edd2e374ce807e19654c9d5869593da1fa1b1f3a384a1b4a1cacc7319bf09f84d159128ac96fd3bf5f14e2279ed6011fdd77a024c3d3
-
Filesize
189KB
MD5e49c7f0471d478991f3f8d799f20afa5
SHA16a796c87bd659df7411d9fc76ab4831082954887
SHA25658ea97ee38db6c87b14fbfff875aebed46b503f424da122dad0b23fc46f1b15d
SHA5122af114cdf586a8e431d8728e8b935079b04fef534da52dd3bafcab60ca1dd0fa52e638b41e5b73cbee66f5ee76ba73bd4acab08280dfc9f5ebe279309e44e772