Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 20:35
Behavioral task
behavioral1
Sample
9855a3dfb0bc4e12bc83c76aa0b482f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9855a3dfb0bc4e12bc83c76aa0b482f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
9855a3dfb0bc4e12bc83c76aa0b482f0N.exe
-
Size
54KB
-
MD5
9855a3dfb0bc4e12bc83c76aa0b482f0
-
SHA1
7e6f9959698742b173b31af45dfda6e0c5b39103
-
SHA256
705af9025eef175c5b6eac58ba8e66cf1b91250f083cad8fc52761259b38eab4
-
SHA512
e051eefb4e02ec91e50124f7788e905f8302e6e7582fd60d64a151fe7b9e57e48dd0c55b54282b6d03d7521580886fed7b5d3a43683f52a86df8ed4bf4a02542
-
SSDEEP
768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9DJKGJKTn/bYONYOR:V7Zf/FAxTWoJJ7ThJKGJKz
Malware Config
Signatures
-
Renames multiple (4627) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/2936-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000b0000000234b3-2.dat upx behavioral2/files/0x000f000000022902-6.dat upx behavioral2/memory/2936-828-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ClickToRun\cpprestsdk.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\UIAutomationClientSideProviders.resources.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\jpeg.md.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-crt-process-l1-1-0.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\limited\local_policy.jar.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Text.Encoding.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\UIAutomationClient.resources.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\ms.pak.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Java\jdk-1.8\include\jni.h.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Retail-pl.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Data.Edm.NetFX35.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.scale-140.png.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\basicsimple.dotx.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\.version.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\UIAutomationClient.resources.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Client\vccorlib140.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Trial-ul-oob.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription2-ul-oob.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_Subscription-ul-oob.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Grace-ppd.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\linesstylish.dotx.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\management.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-interlocked-l1-1-0.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Java\jre-1.8\lib\jvm.hprof.txt.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Paper.xml.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProDemoR_BypassTrial180-ul-oob.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\uk-UA\InputPersonalization.exe.mui.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Java\jdk-1.8\bin\javah.exe.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\SkypeForBusinessVDI2019_eula.txt.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Common Files\System\Ole DB\it-IT\msdasqlr.dll.mui.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\Accessibility.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail2-ppd.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\nl\msipc.dll.mui.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Text.Encoding.Extensions.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_OEM_Perp-pl.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Retail-ppd.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\MSOSEC.DLL.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sl-si.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.VisualBasic.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\System.Windows.Forms.Primitives.resources.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\decora_sse.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Office16\CHART.DLL.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOLoader.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\UIAutomationTypes.resources.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Java\jre-1.8\bin\javaw.exe.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_Trial-pl.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.AppContext.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019VL_KMS_Client_AE-ppd.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTrial-ppd.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Serialization.Json.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Reflection.TypeExtensions.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\jp2iexp.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\blacklisted.certs.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\xerces.md.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\PSRCHPHN.DAT.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.EventSource.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription2-ul-oob.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Grace-ppd.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\7-Zip\Lang\it.txt.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Threading.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.Ping.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\PresentationUI.resources.dll.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Retail-ul-phn.xrm-ms.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe File created C:\Program Files\Microsoft Office\root\Office16\Document Parts\1033\16\Built-In Building Blocks.dotx.tmp 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9855a3dfb0bc4e12bc83c76aa0b482f0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD53f75e257cad71b4227d16a01ad4d2e54
SHA146ef80c429ef3108efa8725479740bbe4c891710
SHA256837d2cf98c467d41118f5e4de01918f701d612b2ca3c457dec0001ccf204e66b
SHA512a43d399b6209fd0903b6a8ab78455aa64d231f7e01566645ce02b420953d9b8841f2c4a9652e8b42224c6ca38cafe4eec1802c7c28c929eb4826502253274769
-
Filesize
153KB
MD50702a1cdea531d3d45624da125dfb931
SHA1ff1e7a68d1cc36c5ac77781da8db55d771647c97
SHA2565e60198f75984d515b55698ac11ef107ad845cf4cffb4c94ad07d709785a7b6f
SHA512551aeb794cf47abd5af65520685bed69adaae9af6d0abeeb4dde2be6f4e79fc515531d77c9262ec9155a8f7dc7304b7f451e9575330a537c42e81d7236c266f8