Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2024, 00:05
Behavioral task
behavioral1
Sample
835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe
Resource
win10v2004-20241007-en
General
-
Target
835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe
-
Size
102KB
-
MD5
2c31f3aad5d32b6e33c690916ab9afd0
-
SHA1
6f74a694c3aa950e6f552166fa79cd07afbf5ce5
-
SHA256
835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4
-
SHA512
971f9ac8ae500dce074ebf9e6b8f5b7d37bb94ebd88cfd552cb510770a0939c1795da9bb9b1e4ab3193e6ac8f249bf9a36b8597e20b15318a1871692ebe43a27
-
SSDEEP
1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8zxY51lnls:enaypQSox51FO
Malware Config
Signatures
-
Renames multiple (4621) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/4088-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000c000000023b59-2.dat upx behavioral2/files/0x0004000000022902-6.dat upx behavioral2/memory/4088-648-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.WebClient.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.Sockets.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\cs\PresentationFramework.resources.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\System.Windows.Controls.Ribbon.resources.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_Subscription-pl.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Trial-ul-oob.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Office16\mce.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\tr\System.Windows.Input.Manipulations.resources.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsid.xml.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\VisualElements\LogoBeta.png.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Java\jdk-1.8\bin\pack200.exe.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\ecc.md.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\sqmapi_x64.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Java\jdk-1.8\bin\javadoc.exe.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\java.security.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Client\C2R32.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Pipes.AccessControl.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\PresentationFramework.resources.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\UIAutomationClientSideProviders.resources.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteFreeR_Bypass-ul-oob.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_OEM_Perp-ul-phn.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WINWORD_F_COL.HXK.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Java\jre-1.8\lib\security\public_suffix_list.dat.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrdeush.dat.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\Microsoft.VisualBasic.Forms.resources.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-crt-private-l1-1-0.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_MAK_AE-ppd.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Office16\mscss7fr.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\mshwLatin.dll.mui.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Common Files\System\ado\ja-JP\msader15.dll.mui.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Java\jdk-1.8\bin\javaws.exe.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Office16\ExcelTellMeOnnxModel.bin.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.Serialization.Xml.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_MAK_AE-ppd.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_OEM_Perp-ul-oob.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_OEM_Perp-ppd.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Trial-ul-oob.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordR_Retail-pl.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.scale-80.png.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\UIAutomationTypes.resources.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-utility-l1-1-0.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Java\jdk-1.8\bin\javapackager.exe.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\charsets.jar.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub_M365_eula.txt.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentDemoR_BypassTrial180-ul-oob.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\7-Zip\Lang\sr-spc.txt.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\7-Zip\Lang\ta.txt.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\keypadbase.xml.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsdeu.xml.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\System.Xaml.resources.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-multibyte-l1-1-0.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Java\jdk-1.8\bin\xjc.exe.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription3-ul-oob.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\MICROSOFT.DATA.RECOMMENDATION.COMMON.DLL.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\SETLANG_COL.HXT.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\System.Windows.Forms.resources.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Trial-pl.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardMSDNR_Retail-pl.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Office15\pkeyconfig-office.xrm-ms.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.scale-180.png.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\7-Zip\Lang\gu.txt.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\Common Files\System\msadc\es-ES\msaddsr.dll.mui.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Globalization.dll.tmp 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe"C:\Users\Admin\AppData\Local\Temp\835a558aa56d87ef242c67e8e52ae44f56f4b50193af08d839437feb44137df4.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD508685577bdba9404de42c019616bbb77
SHA1e7272afc20dcc4df965372d2e1e6309dc837bdeb
SHA25627f8d357a7a2fa09e3e5920bdb9d58c58035621539c714b67f1da2a9c0efacdf
SHA512122dd19a6ca1167ec04c984d33225a3e61c894902832ae4b105a59eed5d0add521022b4e79abbe3d433eef4e1241614d4a36dc2f783f0f13ec93a7bf407d8481
-
Filesize
202KB
MD5caae663ca76a35b76c0d8fcc5db2e529
SHA1bbce79a2f871ffdef3c3705c86ba8f8b5bc36e5d
SHA25675e826760158105a4fbe5dc7a0734737bbd89709e3509ea4420baeab916555d0
SHA5128b98b8d22020553fcf9670e00bac8e9db0a03bd9a81f8b2e42225f0031102381c2fbd6d44b636810ca605f10975bc403e08d97677a0427dfc4476ecc6de34b95