Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
e3410d39570191606215cefcf9837000N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3410d39570191606215cefcf9837000N.exe
Resource
win10v2004-20240802-en
General
-
Target
e3410d39570191606215cefcf9837000N.exe
-
Size
40KB
-
MD5
e3410d39570191606215cefcf9837000
-
SHA1
3e17e6070fded7b0315ca004fd2914d0c097949c
-
SHA256
45f47a3b60ab87be44aa846276888222857c349e7e7326a5e14f9d8057ee1c3f
-
SHA512
73f4749b1a785b90c603200fe1caa3261453854e334d6ce1bb39e5bb2f54e58d57447bad16038ed0cbc92f1834d01a477e2d6ef9e05861b83c1f843fa74d5727
-
SSDEEP
768:W7BlphA7pARFbhM0Kkq81LOyq81LObC8p8tiOeiOF:W7ZhA7pApM21LOA1LOiiOeiOF
Malware Config
Signatures
-
Renames multiple (4662) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jre-1.8\lib\fonts\LucidaTypewriterRegular.ttf.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Private.Uri.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\UIAutomationProvider.resources.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\UIAutomationClient.resources.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\mesa3d.md.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\freebxml.md.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_MAK-ul-phn.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.XDocument.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00A1-0409-1000-0000000FF1CE.xml.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\pkeyconfig-office.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProMSDNR_Retail-ul-oob.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.ComponentModel.TypeConverter.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\UIAutomationClientSideProviders.resources.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\System.Windows.Forms.Primitives.resources.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019DemoR_BypassTrial180-ul-oob.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Grace-ul-oob.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-80.png.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-rtlsupport-l1-1-0.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.ComponentModel.Primitives.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\ucrtbase.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\System.Windows.Forms.Primitives.resources.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\sl\msipc.dll.mui.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pl\UIAutomationClient.resources.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\wpfgfx_cor3.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Internet Explorer\en-US\ieinstal.exe.mui.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Diagnostics.TextWriterTraceListener.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\PresentationCore.resources.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Java\jre-1.8\bin\java.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_MAK_AE-pl.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ms-my.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\pkeyconfig.companion.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Common Files\microsoft shared\VC\msdia100.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.InteropServices.RuntimeInformation.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019MSDNR_Retail-pl.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp5-ul-oob.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\it\msipc.dll.mui.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ThirdPartyNotices.MSHWLatin.txt.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Common Files\System\Ole DB\es-ES\msdasqlr.dll.mui.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\cs\WindowsBase.resources.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Trial-ul-oob.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial2-ul-oob.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_Retail-ppd.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalPipcR_OEM_Perp-ul-oob.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdXC2RVL_KMS_ClientC2R-ul.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvStreamingManager.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\System.Windows.Controls.Ribbon.resources.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_fr.properties.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_Grace-ul-oob.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.ObjectModel.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_MAK-ul-oob.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\thaidict.md.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Java\jre-1.8\bin\ssv.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019DemoR_BypassTrial180-ppd.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.lv-lv.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientEventLogMessages.man.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ReachFramework.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationFramework.Aero.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\TPN.txt.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\ru\msipc.dll.mui.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\trusted.libraries.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-file-l1-1-0.dll.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_OEM_Perp-ppd.xrm-ms.tmp e3410d39570191606215cefcf9837000N.exe File created C:\Program Files\7-Zip\Lang\mng2.txt.tmp e3410d39570191606215cefcf9837000N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3410d39570191606215cefcf9837000N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5b8351dc7c942d60a9331f756a74fdef7
SHA1d7013b722e21e5cf592ac21d6c4343e46e19fccc
SHA25635e0ba76cc9cd581e52de2faab2a379a845c81b3d05e8dd89676c88081ea4d7a
SHA512747b7858f1b6337e8b60d20d851cd903ec2246a2103a1465aadf2f95e8fd34fcce03a2bb2d885920210609c818e190e27408766e0db6fdcd3804c28da34093bd
-
Filesize
139KB
MD5a428c613ec40115ab3930b6e921df515
SHA1fc58bb79cf64d62b47ad7555bff290c1599b1844
SHA256d12a746824cf2a471e64dc8b70008758c7adbef5026a2e977a84cb65dd370b68
SHA512b20cbdd9ffc7d14573336fc302f460e747dbc830bb2030b82daf3337a52e82048b2fab43138c73acd090ddc4cd5d41df313b848f5ea5588ee157b91208bab1c2