Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 06:43
Behavioral task
behavioral1
Sample
641f0c4b44a107b94a91460b50062fe0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
641f0c4b44a107b94a91460b50062fe0N.exe
Resource
win10v2004-20240802-en
General
-
Target
641f0c4b44a107b94a91460b50062fe0N.exe
-
Size
28KB
-
MD5
641f0c4b44a107b94a91460b50062fe0
-
SHA1
0a78f5e8058f9e1a266c44db56ec265abafc7b17
-
SHA256
6716211cb2f2349e33b2843b71ca155a9941c1f57a139b77ae5b8ee0a5c2c8e6
-
SHA512
f5605c03d52f0725c5cb800d20b92a9d82f9f0bf996d538395f613d5912f94a2278bc4c71b3778eb0afea20acd5658e6cf32c331a9ef5db1f93460f6b08995be
-
SSDEEP
768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mk12:CTW7JJZENTNyl2Sm0mD
Malware Config
Signatures
-
Renames multiple (506) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/memory/2432-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x000900000001227c-2.dat upx behavioral1/files/0x0002000000010463-6.dat upx behavioral1/memory/2432-26-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\tipresx.dll.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\DVD Maker\de-DE\DVDMaker.exe.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Internet Explorer\pdm.dll.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\tabskb.dll.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\OrangeCircles.jpg.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\tipresx.dll.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\IpsMigrationPlugin.dll.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\icudtl.dat.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\tipresx.dll.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\scrapbook.png.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationUp_SelectionSubpicture.png.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\th.pak.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\sysinfo.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\7-Zip\Lang\sq.txt.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_SelectionSubpicture.png.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Google\Chrome\Application\chrome.exe.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Internet Explorer\jsdbgui.dll.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_rtl.xml.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_ca.xml.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\1047x576black.png.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_LOOP_BG_PAL.wmv.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\FlickLearningWizard.exe.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\7-Zip\Lang\io.txt.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_altgr.xml.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\GetSuspend.svgz.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\sw.pak.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkClientCP.bat.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jsdt.dll.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\7-Zip\Lang\hy.txt.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\System\ado\msador15.dll.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\DVD Maker\es-ES\OmdProject.dll.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\1047x576black.png.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\startNetworkServer.bat.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\TipTsf.dll.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwritash.dat.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\System\ado\msado27.tlb.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\System\msadc\es-ES\msaddsr.dll.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\DVD Maker\de-DE\WMM2CLIP.dll.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground.wmv.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\nacl_irt_x86_64.nexe.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\webbase.xml.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\System\ja-JP\wab32res.dll.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\selection_subpicture.png.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\eventlog_provider.dll.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\am.pak.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\7-Zip\Lang\en.ttt.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsplk.xml.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationRight_SelectionSubpicture.png.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InkWatson.exe.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\FlickLearningWizard.exe.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\InkObj.dll.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\Common Files\System\Ole DB\ja-JP\msdasqlr.dll.mui.tmp 641f0c4b44a107b94a91460b50062fe0N.exe File created C:\Program Files\DVD Maker\Shared\Parity.fx.tmp 641f0c4b44a107b94a91460b50062fe0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 641f0c4b44a107b94a91460b50062fe0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD544f65e8ddf0b66fe06d6a65589f05bda
SHA1102906739dcb8320ffdbf7dca7df04a1befb239c
SHA256fe3b72f3d9d986a5147546d69e3df6882a55a807adc9d65452b3855ef9d21403
SHA51216534bf9a93f8b974f5c3025062b0961c221311bf3ce9b172df862ded5d2d7979ccb3332841bd643a5c2caace37d48ebfafc935cbe8b9ea2dba43193a6871a4a
-
Filesize
37KB
MD519a5bc16afcb6b08aa4e216194dc8bac
SHA142cebb2950d0fd0b701bf9eaf1e1e22be23dc65e
SHA256028fa7a468fe1e21f14a3f82fb5c596b8119ea38d63f5eb54fcdb99e23da1a20
SHA51209e2beec5652a1de8a9d222981866bcc1ba584f1d1df0744ae55b9dda8a1937ec9704b44697cefabb3fc35da91cbfdb137e91c60c9a70a8c5a44cbd3206ba4be