Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 01:18
Behavioral task
behavioral1
Sample
a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe
Resource
win10v2004-20240412-en
General
-
Target
a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe
-
Size
1.2MB
-
MD5
0adbcabe88bed42b12992356f64844f8
-
SHA1
453468f18bfbad686e0915510819bdc8378607ea
-
SHA256
a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3
-
SHA512
749ec6b5b9703bb96159360c5d1b87f3ba96b8600352da88939db5a6927ce08981e54c4e5c67a3e0182b6786d686939dd44ebcf6e97643d4d779b9c0cf9a7d4f
-
SSDEEP
6144:6STzDMaMNhXbyuWt2EHOO+7qeA5fphPFrKz1K5Pe9G6DMzAd2M+od7MHG+tO2tZ0:nTe7AG9G6DMzAo87Cps0o3HPYxuWe
Malware Config
Signatures
-
Renames multiple (694) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral1/memory/2864-0-0x0000000000400000-0x000000000046E000-memory.dmp UPX behavioral1/memory/2864-30-0x0000000000400000-0x000000000046E000-memory.dmp UPX behavioral1/files/0x000c000000014454-34.dat UPX behavioral1/files/0x000200000001048b-38.dat UPX -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
resource yara_rule behavioral1/memory/2864-0-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2864-30-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/files/0x000c000000014454-34.dat upx behavioral1/files/0x000200000001048b-38.dat upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2864 set thread context of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\bear_formatted_rgb6.wmv.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\chapters-static.png.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\7-Zip\Lang\kab.txt.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\mip.exe.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\15x15dot.png.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\TravelIntroToMainMask.wmv.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\7-Zip\Lang\da.txt.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\InkWatson.exe.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\System\msadc\msdarem.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\menu_style_default_Thumbnail.png.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-imageMask.png.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkDiv.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\tipresx.dll.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\MSTTSLoc.dll.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationUp_ButtonGraphic.png.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\HideWatch.m4v.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Monrovia.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsrom.xml.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\tipresx.dll.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Tanspecks.jpg.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\vstoee90.tlb.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\System\ado\msadomd.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-background.png.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ar.pak.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\dicjp.bin.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\ShapeCollector.exe.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\tipresx.dll.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\db\NOTICE.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Accra.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derby.jar.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\IpsMigrationPlugin.dll.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipscat.xml.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\icudtl.dat.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\tipresx.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationRight_SelectionSubpicture.png.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationUp_SelectionSubpicture.png.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push.png.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Internet Explorer\F12Resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\java.exe.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\ea-sym.xml.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground.wmv.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-next-over-select.png.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Salta.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyclient.jar.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\BlockSave.wps.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msadcer.dll.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\reflect.png.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOLoader.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationUp_ButtonGraphic.png.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\libGLESv2.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Google\Chrome\Application\chrome.exe.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\7-Zip\7z.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\7-Zip\Lang\it.txt.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\tipresx.dll.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkClientCP.bat.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\glib-lite.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jsound.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2364 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 28 PID 2864 wrote to memory of 2364 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 28 PID 2864 wrote to memory of 2364 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 28 PID 2864 wrote to memory of 2364 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 28 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30 PID 2864 wrote to memory of 296 2864 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe"C:\Users\Admin\AppData\Local\Temp\a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exeC:\Users\Admin\AppData\Local\Temp\a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe2⤵
- Drops file in Program Files directory
PID:296
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD50ce545ce0c6aca53d54042f8d29a3f28
SHA12f0223c3a04a7a98c78142ccd147af83774019ec
SHA256921052210cb50eb65aca4f58b9172cab5ab717f4232f74e1bd47b65c5e67a592
SHA51228d483502149b546b71358fdc5e23b4d75df2606c92f528876ddcf513ace5021d4af60077fe86483c9cfc543d8db5257eeab02a9e22ee443ebe5bdee695b8fa9
-
Filesize
1.2MB
MD5fa4a589ec591548c175918b860458ff3
SHA1e0b6ab8008559b4f74f0c536506da3255458a31d
SHA256ee883c57d5fb639ba32f33c65e05df2a480f0e492f9a6ee73edda91e2b6ddcb3
SHA5128875b426586dee732228087c7e6a22ba81c72b96096af0d21afa30c39e698e23d7c3604a72d722831e1d407bb64e27118c3807ec324b2b7fcea78911aecce343