Analysis
-
max time kernel
120s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 12:33
Behavioral task
behavioral1
Sample
0b17386631e0ceaff83d8019558bf980N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0b17386631e0ceaff83d8019558bf980N.exe
Resource
win10v2004-20240709-en
General
-
Target
0b17386631e0ceaff83d8019558bf980N.exe
-
Size
78KB
-
MD5
0b17386631e0ceaff83d8019558bf980
-
SHA1
f14aff16130c383fc8dc102055c115c6c1c3c0fe
-
SHA256
4278cdc700ab187a22cf63217d6d15a70fd589537927fe4ce1e9859413c99d3e
-
SHA512
52baf2b1762c201a82644cebb444e249dfcfe0a9c82b89ceade9df4966ba1308d96c48fdcea8e9f621d7e2091770f9d8d61e2c0077bec9cef0ea32aecfe4ea73
-
SSDEEP
1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsK8/8A:fnyiQSohsUsxkA
Malware Config
Signatures
-
Renames multiple (4001) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/3068-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x00090000000234d4-2.dat upx behavioral2/files/0x0014000000022932-6.dat upx behavioral2/memory/3068-1640-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\System.Windows.Forms.resources.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_KMS_Client_AE-ul-oob.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PenImc_cor3.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\relaxngdatatype.md.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_pt_BR.properties.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jre-1.8\bin\t2k.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_OEM_Perp-ppd.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Retail-ppd.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jdk-1.8\bin\rmic.exe.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Retail-ppd.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jre-1.8\lib\currency.data.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Trial-ul-oob.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pl\UIAutomationProvider.resources.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\pkcs11cryptotoken.md.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProMSDNR_Retail-ppd.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.Serialization.Xml.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Diagnostics.Contracts.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ru\UIAutomationClient.resources.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Configuration.ConfigurationManager.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\management\jmxremote.password.template.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\libpng.md.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Collections.Immutable.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\af.pak.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.office32ww.msi.16.x-none.xml.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\msotdintl.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Common Files\microsoft shared\ink\mraut.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Threading.Tasks.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.FileSystem.Primitives.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Diagnostics.Process.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\UIAutomationProvider.resources.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\UIAutomationClientSideProviders.resources.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_MAK-pl.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_Subscription-pl.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessR_Retail-ul-phn.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-ppd.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\msquic.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\WindowsFormsIntegration.resources.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\LucidaBrightItalic.ttf.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\fre\StartMenu_Win8.mp4.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_OEM_Perp-ul-phn.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_Subscription-ppd.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.Intrinsics.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Internet Explorer\iexplore.exe.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\nashorn.jar.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Grace-ul-oob.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-phonetic.xml.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_it.properties.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\PresentationFramework.resources.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\System.Windows.Input.Manipulations.resources.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordR_Retail-ul-phn.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Common Files\System\Ole DB\msdaosp.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\System.Windows.Forms.Primitives.resources.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\Microsoft.Win32.SystemEvents.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\chrome_elf.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_OEM_Perp-pl.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\UIAutomationProvider.resources.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\FormatBlock.raw.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-crt-convert-l1-1-0.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\clretwrc.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\System.Windows.Forms.Primitives.resources.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jdk-1.8\jvisualvm.txt.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_OEM_Perp-ul-oob.xrm-ms.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\UIAutomationClient.resources.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe File created C:\Program Files\Java\jre-1.8\bin\deploy.dll.tmp 0b17386631e0ceaff83d8019558bf980N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b17386631e0ceaff83d8019558bf980N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5d1456e4aa82748cdff25ae8b6387ffda
SHA15124cf8388287fb44507f3be516862fd2cde307b
SHA256ffdedb623594dc5e9cafed1d2ac896aa91aa389f7d5857817ef1a0c6a95f41c7
SHA512060ed778fb409f7ba1dd552c3adbd35e0eb3e0f8ca0be84ca05723aee23cae7ce95fa2a278b9806d797fee070e817955848d1a6f37fdfa840cab0d6c1a37b114
-
Filesize
177KB
MD535bc7e808f31a714a4c3ddb6f0ee670a
SHA1eee9de5b1a3859ca904694fd29d7b82caf29c0d7
SHA256f5b25faaf44ac6e29993e07d9ff8606fa650eb0a142c06d0cc8ab08e34fd4186
SHA512304808a6ac7f204a982c7af13193473fdb08586cd37ad01c78b9984051a1e625a1f7a97035de477f59acc775d46de8837ba3e28aeb8b4a74d8210090dfa5a711