Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 13:34
Behavioral task
behavioral1
Sample
c793aeb4de5306c17e956215c31c7cc0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c793aeb4de5306c17e956215c31c7cc0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c793aeb4de5306c17e956215c31c7cc0N.exe
-
Size
67KB
-
MD5
c793aeb4de5306c17e956215c31c7cc0
-
SHA1
512ca3fd98e266f278f3cf4ffec62782b8ca6923
-
SHA256
216648e539a3f6e7c21bdd0f0fb7e9329886c0f05d21cfa9fc9042e777d4490e
-
SHA512
a40b702958a1de609e1d09be638b4b74e2b25344159dc1ef4630dd13337d8ffefa3cae7a556dbadd3b6c7ad11052960fcc00494c7cc4c10b7b5f0fbbbefdb2b8
-
SSDEEP
1536:CTWn1++PJHJXA/OsIZfzc3/Q8zx4LgLTorob:KQSoFcvorob
Malware Config
Signatures
-
Renames multiple (4382) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/808-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x00090000000233eb-2.dat upx behavioral2/files/0x0004000000022933-6.dat upx behavioral2/memory/808-848-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\System.Windows.Forms.resources.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-console-l1-2-0.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Grace-ul-oob.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-convert-l1-1-0.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.ComponentModel.Primitives.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationNative_cor3.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_SubTest-ppd.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\lcms.md.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Java\jdk-1.8\lib\jvm.lib.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp2-ppd.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\7-Zip\Lang\fi.txt.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\UIAutomationTypes.resources.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\Office16\OSPP.VBS.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_SubTest-pl.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_MAK-ul-oob.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\sql90.xsl.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\GKPowerPoint.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\mscordaccore.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\UIAutomationClient.resources.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Java\jre-1.8\bin\prism_common.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019MSDNR_Retail-ul-oob.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.DiaSymReader.Native.amd64.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\System.Windows.Forms.Primitives.resources.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Internet Explorer\fr-FR\ieinstal.exe.mui.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.SapBwProvider.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\7-Zip\Lang\et.txt.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.XmlSerializer.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Trial-ul-oob.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Reflection.Emit.ILGeneration.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\D3DCompiler_47_cor3.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\w2k_lsa_auth.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessEntry2019R_PrepidBypass-ul-oob.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\IEAWSDC.DLL.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\7-Zip\Lang\hy.txt.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.json.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\oskclearuibase.xml.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\cldr.md.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Retail-ul-phn.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_KMS_Client_AE-ul.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_Subscription-ul-oob.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_SubTest-pl.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-string-l1-1-0.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Common Files\Services\verisign.bmp.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.WebClient.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationFramework-SystemDrawing.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-profile-l1-1-0.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_Subscription-ul-oob.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdXC2RVL_MAKC2R-ul-oob.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Common Files\System\Ole DB\fr-FR\sqloledb.rll.mui.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\libGLESv2.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\JoinStart.tmp.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_OEM_Perp-ppd.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Trial-ppd.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription5-pl.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019MSDNR_Retail-ul-oob.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.NETCore.App.deps.json.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\System.Windows.Controls.Ribbon.resources.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-sysinfo-l1-1-0.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-namedpipe-l1-1-0.dll.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\sunmscapi.jar.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019DemoR_BypassTrial180-ul-oob.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp3-ul-oob.xrm-ms.tmp c793aeb4de5306c17e956215c31c7cc0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c793aeb4de5306c17e956215c31c7cc0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD528e1c91e14fa29659e5dc141e640e96b
SHA14ea4c488797c70f614873b1b6081a3822d052f6b
SHA25661769b620ff8d03e75e5c302c1efa62d92a68aaffaf73a72a935ec9fc6ca485c
SHA51282bd5abd0bc406c9b64ee1a6a7c0038310b8c55b446a6b6bf548a65c1fea908cf73c9ba7b5267f88c099ec443d8c09d7d92196bc7b1d7352a58e2d8cccbdfa88
-
Filesize
166KB
MD524512c05f72b425c57563ada152e1372
SHA1816f3843bfb09489bac37a0954dae01360a67de7
SHA25617d7cdf3588145a2582e5e31565282a1c9fcb98dde115f7bf7a85b1bb1f6ab8d
SHA512f1c8810da4e8448abdf4df626fcd5d00f68af92aba44cb95c2af60140c6423d22fe2a9cd489677e0ca1a5a3b6897db93650600e0a405a2aedb17f42a181d4439