Analysis
-
max time kernel
120s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 13:46
Behavioral task
behavioral1
Sample
15db2fe1d4e6cbf8b04b644d501a23e0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
15db2fe1d4e6cbf8b04b644d501a23e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
15db2fe1d4e6cbf8b04b644d501a23e0N.exe
-
Size
45KB
-
MD5
15db2fe1d4e6cbf8b04b644d501a23e0
-
SHA1
a9d403e8685ff34171c00530f16d4454084d403c
-
SHA256
a7d0023c5b24e3c20ae406017580e1cfdfcd9fc7b9af21b5aeacf82d5c60ac21
-
SHA512
3948f9ce235d4bf4fe82a5b9957ba495b60e2372e3684aeaa6fb2cd20f4a54c85b675602f9808a2b057734d0a2c845b446fa6d8f481e458e7609b6309c65fa3a
-
SSDEEP
768:V7Blpf/FAK65euBT37CPKKQSjyJJBZBZaOAOIB3jM2jM7lN:V7Zf/FAxTWoJJB7LD2I2IH
Malware Config
Signatures
-
Renames multiple (3314) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/1308-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x0009000000023492-2.dat upx behavioral2/files/0x0014000000022905-6.dat upx behavioral2/memory/1308-1598-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\tr.pak.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTrial-ul-oob.xrm-ms.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\7-Zip\Lang\nb.txt.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\UIAutomationClientSideProviders.resources.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\win32_CopyNoDrop32x32.gif.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\fre\StartMenu_Win10_RTL.mp4.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.kk-kz.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\VisualElements\SmallLogoBeta.png.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ExcelVL_MAK-pl.xrm-ms.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_OEM_Perp-pl.xrm-ms.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.SecureString.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest4-ul-oob.xrm-ms.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\uk-UA\TipRes.dll.mui.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\msinfo32.exe.mui.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\System.Windows.Forms.Primitives.resources.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Diagnostics.EventLog.Messages.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jre-1.8\lib\security\cacerts.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\WindowsBase.resources.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-processthreads-l1-1-0.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_SubTest-ul-oob.xrm-ms.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\mr.pak.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\sawindbg.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Orange Red.xml.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_KMS_Client-ul.xrm-ms.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Common Files\System\de-DE\wab32res.dll.mui.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.WebSockets.Client.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\bin\wsgen.exe.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\calendars.properties.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Trial-ppd.xrm-ms.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\accessibility.properties.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.AccessControl.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.Cryptography.Csp.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\System.Windows.Forms.Primitives.resources.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\System.Windows.Forms.Design.resources.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-heap-l1-1-0.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\sspi_bridge.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-file-l1-1-0.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Reflection.Primitives.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\System.Windows.Controls.Ribbon.resources.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\PresentationFramework.resources.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\prism_d3d.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\javafx\jpeg_fx.md.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\Client\C2R64.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\sr.pak.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\hostpolicy.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Reflection.Emit.ILGeneration.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\PresentationUI.resources.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-conio-l1-1-0.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\bin\jar.exe.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\javafx_font.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jre-1.8\bin\orbd.exe.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\Client\msvcp120.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTrial-pl.xrm-ms.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\javafx\libffi.md.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Organic.thmx.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\ExportEnable.m1v.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\en-US.pak.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jre-1.8\bin\server\classes.jsa.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_OEM_Perp-ul-oob.xrm-ms.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.Quic.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.XPath.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\PresentationCore.resources.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-util-l1-1-0.dll.tmp 15db2fe1d4e6cbf8b04b644d501a23e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15db2fe1d4e6cbf8b04b644d501a23e0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5dedebf68fc9d70f6008c42fe5dbbb321
SHA1726ebd235cc176dcc62e8a40260244948a111cc2
SHA256587ea23b8de79acd64592360bd340c943fb44ddcdcef53a606bf744acdbde7fd
SHA5123b85584a2e4f5e25fd48d5d507feb1c92b35bc8e993c40f3bf31ab95bce0a4abcbcc5cff8dea3b5825aa654dbc787a5bcc0a623002a58ee635bed757ee3eb147
-
Filesize
144KB
MD5e22faf1297f8c6353ac7444d2160aa0f
SHA15e98a84f877f98022e9770914d31890f2d2eeb57
SHA2560ad3341d2563c22751605d3d53ab30cff1e38788fa011151b95b387b5f5b1856
SHA51259825b3840cdf830be428cc6292c2c4f6dfa96cbe634536020c77c3322b6ded9905a25cf06a6317ffc03f649b6aa1bd21d87c2f022ee11b61779eb535b7db718