Analysis
-
max time kernel
120s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 11:04
Behavioral task
behavioral1
Sample
c4264923719e2711676bda87e55dac20N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c4264923719e2711676bda87e55dac20N.exe
Resource
win10v2004-20240709-en
General
-
Target
c4264923719e2711676bda87e55dac20N.exe
-
Size
47KB
-
MD5
c4264923719e2711676bda87e55dac20
-
SHA1
adcb9a22a66727a469dcd2e56442be2691c32a79
-
SHA256
1af4a7c8662406b22c5d04e14c7634c373bdb1c1a563316f3e5a999c134a3b6c
-
SHA512
1ed9d17c8d202e2402c8c95f1991ab77962dd1ca1fae85f6516c11eeff91a900d0bd9a8c842f64e85c7bf0764851e6c583a969e8668a7ada93d58317b4602dad
-
SSDEEP
768:V7Blpf/FAK65euBT37CPKKQSjyJJBZBZaOAOIB3jM2jMHrRr5:V7Zf/FAxTWoJJB7LD2I2IHtt
Malware Config
Signatures
-
Renames multiple (4641) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/5104-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000900000002340f-2.dat upx behavioral2/files/0x0014000000022946-6.dat upx behavioral2/memory/5104-1826-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jre-1.8\bin\mlib_image.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Grace-ul-oob.xrm-ms.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Trial-pl.xrm-ms.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Trial-ppd.xrm-ms.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART10.BDR.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\7-Zip\Lang\cy.txt.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Private.Xml.Linq.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\UIAutomationTypes.resources.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\pkcs11wrapper.md.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-100.png.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Office16\msoasb.exe.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-heap-l1-1-0.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.WebClient.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\jcup.md.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\flavormap.properties.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\pkcs11cryptotoken.md.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.NetworkInformation.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jre-1.8\lib\charsets.jar.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-ul-phn.xrm-ms.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Threading.Thread.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\System.Windows.Forms.Primitives.resources.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\UIAutomationClient.resources.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jre-1.8\lib\logging.properties.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Orange.xml.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\7-Zip\Lang\va.txt.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-rtlsupport-l1-1-0.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jdk-1.8\bin\jps.exe.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jdk-1.8\lib\packager.jar.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Office.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Resources.Writer.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\dt_shmem.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Client\msvcp120.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\dbgshim.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\UIAutomationProvider.resources.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\instrument.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\java_crw_demo.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue Warm.xml.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power View Excel Add-in\Microsoft.PowerBI.Diagnostics.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-black_scale-100.png.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\7-Zip\Lang\gu.txt.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Common Files\System\ado\msado20.tlb.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\System.Windows.Forms.Design.resources.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_Grace-ul-oob.xrm-ms.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientARMRefer2019_eula.txt.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\7-Zip\7-zip.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationFramework.AeroLite.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\ecc.md.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdCO365R_SubTrial-ul-oob.xrm-ms.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Sort\YEAR.XSL.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Reflection.Emit.ILGeneration.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\WindowsBase.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_OEM_Perp-pl.xrm-ms.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WINWORD.HXS.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\server\Xusage.txt.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Java\jre-1.8\bin\plugin2\vcruntime140.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_MAK-ul-oob.xrm-ms.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Threading.Tasks.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.FileSystem.AccessControl.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.Pipes.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\System.Windows.Forms.resources.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\System.Windows.Forms.resources.dll.tmp c4264923719e2711676bda87e55dac20N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\System.Windows.Controls.Ribbon.resources.dll.tmp c4264923719e2711676bda87e55dac20N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4264923719e2711676bda87e55dac20N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD54cfb86ee4ebcd9e6fb699ee333a7b265
SHA124d02165be2a35ac13acd12dfab0b015a4ad42c9
SHA2569bdf72a22381c46c755179859295fa6b543b0b64a24cb5652d27988e25b2f681
SHA51225faa811a2902b48e6eee5eecc74680e6ea63e062a66a84469f39276900a83c843e3093b56ca80a4a5d79088e540ba62e25bbe0ae283b9e6c27773eb4a337f92
-
Filesize
146KB
MD502d4affdc3a760b6c561c66a2d5154c0
SHA16bbaa860e364f99f56b03ceaad4fcd5bf1c9238a
SHA256de4ca351e7cbcc784823f0fe0df33edcb8935af21293ebbf1172465866dfcbb6
SHA5128561dcc2363921fd26e80aae01d92110a88eefc6bc3367a40ac36bdd7e7e549377b46d650c7a8eb721eebd48b1eb9a60cf096b50b37aaedcf01ef8dfc667b0ad