Analysis
-
max time kernel
150s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 01:18
Behavioral task
behavioral1
Sample
a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe
Resource
win10v2004-20240412-en
General
-
Target
a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe
-
Size
1.2MB
-
MD5
0adbcabe88bed42b12992356f64844f8
-
SHA1
453468f18bfbad686e0915510819bdc8378607ea
-
SHA256
a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3
-
SHA512
749ec6b5b9703bb96159360c5d1b87f3ba96b8600352da88939db5a6927ce08981e54c4e5c67a3e0182b6786d686939dd44ebcf6e97643d4d779b9c0cf9a7d4f
-
SSDEEP
6144:6STzDMaMNhXbyuWt2EHOO+7qeA5fphPFrKz1K5Pe9G6DMzAd2M+od7MHG+tO2tZ0:nTe7AG9G6DMzAo87Cps0o3HPYxuWe
Malware Config
Signatures
-
Renames multiple (2038) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/memory/4456-0-0x0000000000400000-0x000000000046E000-memory.dmp UPX behavioral2/memory/4456-4-0x0000000000400000-0x000000000046E000-memory.dmp UPX behavioral2/files/0x000a0000000233fc-8.dat UPX behavioral2/files/0x0007000000022962-12.dat UPX -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
resource yara_rule behavioral2/memory/4456-0-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral2/memory/4456-4-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral2/files/0x000a0000000233fc-8.dat upx behavioral2/files/0x0007000000022962-12.dat upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4456 set thread context of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\System.Windows.Controls.Ribbon.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\UIAutomationClient.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\UIAutomationTypes.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\7-Zip\Lang\pa-in.txt.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.MemoryMappedFiles.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Core.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk-1.8\jmc.txt.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-processthreads-l1-1-1.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Diagnostics.Debug.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\WindowsFormsIntegration.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\microsoft shared\VC\msdia100.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\cs\System.Windows.Forms.Design.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\ml.pak.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\microsoft shared\ink\et-EE\tipresx.dll.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrusash.dat.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\InputPersonalization.exe.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\mshwLatin.dll.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Transactions.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\PresentationFramework.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Serialization.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.Cryptography.Cng.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Threading.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Cryptography.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\Microsoft.VisualBasic.Forms.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\microsoft shared\ink\hr-HR\tipresx.dll.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\System\msadc\ja-JP\msadcer.dll.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Resources.Writer.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\PresentationCore.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PenImc_cor3.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\sl.pak.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.ComponentModel.Primitives.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.Loader.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\System.Windows.Input.Manipulations.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Security.Permissions.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Transactions.Local.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.Http.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\PresentationCore.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-stdio-l1-1-0.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\microsoft shared\ink\InkDiv.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\UIAutomationClientSideProviders.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\WindowsBase.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\UIAutomationClientSideProviders.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\UIAutomationProvider.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\netstandard.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.ComponentModel.Annotations.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Reflection.Extensions.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Serialization.Primitives.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-interlocked-l1-1-0.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.de-de.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\System\Ole DB\ja-JP\oledb32r.dll.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Numerics.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\System\Ole DB\it-IT\msdasqlr.dll.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\PresentationFramework.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\PresentationCore.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_kor.xml.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Numerics.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Internet Explorer\ja-JP\iexplore.exe.mui.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\uk.pak.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\7-Zip\Lang\bn.txt.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\System.Windows.Forms.Primitives.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\ReachFramework.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\WindowsBase.resources.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.WebClient.dll.tmp a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4456 wrote to memory of 1360 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 86 PID 4456 wrote to memory of 1360 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 86 PID 4456 wrote to memory of 1360 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 86 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91 PID 4456 wrote to memory of 5000 4456 a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe"C:\Users\Admin\AppData\Local\Temp\a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exeC:\Users\Admin\AppData\Local\Temp\a343cb9b5dab828a9aac1548dbd7c2327ce01cde195725934c4f0a7587258ad3.exe2⤵
- Drops file in Program Files directory
PID:5000
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d37854dedb3ae2e637a9ab346179f0ee
SHA147194a604d48d3927c8ba33bc60a89bfbd5a0aa3
SHA2562ce032dd2e3ec3e3f3dc04218e377c946596ec29b70430a5095569e7df1baeed
SHA512f0a5cd21d424808fa6328e0b7c62f114c450fedc94acbb35b2d2da29f319898955b4ebfcaef1d1bcbb41458d9ee6f0232b0cffa26a572a431dd7bb7ae5e365a3
-
Filesize
1.3MB
MD56347447e5a7d63b45f3417d579eb9d81
SHA1091171c5b745f705e27056754e34290b8d9ff80d
SHA256ec4c2b2d8ec9232010d861d3c8a3a86cb8c1cd237544de7131a00b1b6d70c094
SHA5120fa56cb9c57b056e300f29ea0e5f0c996b738f2c283e89cdd134e5bea5a3db4b3ed50529b78d7f76f93e457a593af41bc61e2a96d7b66515427cac4757baf0be