Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 06:48
Behavioral task
behavioral1
Sample
601a57dee73231e51a1ee2223b818110N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
601a57dee73231e51a1ee2223b818110N.exe
Resource
win10v2004-20240802-en
General
-
Target
601a57dee73231e51a1ee2223b818110N.exe
-
Size
46KB
-
MD5
601a57dee73231e51a1ee2223b818110
-
SHA1
2d0b6ab830de1da3083d44cac1d650592d03a509
-
SHA256
2b75b0cc5340a9a0365d07110a81e9e91913eb830b43ca203d8af486aeab271c
-
SHA512
a35dcb90ad20f3338f45aed13caac4bec2e11ea7b6747685af07a87a8b4ecf39d2d946311058ae4becd009f3b18e99d9ad4d3deaf19b0857e2b27d505d23f7d8
-
SSDEEP
768:V7Blpf/FAK65euBT37CPKKQSjyJJTU3U2la3F53F57bT:V7Zf/FAxTWoJJTU3URz5T
Malware Config
Signatures
-
Renames multiple (4668) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/4520-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x00090000000233d1-2.dat upx behavioral2/files/0x0014000000022913-6.dat upx behavioral2/memory/4520-1958-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProDemoR_BypassTrial180-ppd.xrm-ms.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\System.Windows.Forms.Design.resources.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\libxslt.md.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\IEEE2006OfficeOnline.xsl.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Common Files\System\Ole DB\es-ES\oledb32r.dll.mui.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_MAK-ul-oob.xrm-ms.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.cpl.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.contrast-white_scale-100.png.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\NPSPWRAP.DLL.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_Grace-ppd.xrm-ms.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-white_scale-140.png.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\System.Windows.Input.Manipulations.resources.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\System.Windows.Forms.Primitives.resources.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\zlib.md.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Java\jre-1.8\bin\dt_shmem.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_KMS_Client-ul-oob.xrm-ms.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-white_scale-180.png.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Common Files\microsoft shared\ink\uk-UA\TabTip.exe.mui.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.Windows.Controls.Ribbon.resources.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationFramework.Luna.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.FileSystem.Watcher.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\System.Windows.Forms.Primitives.resources.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationFramework.AeroLite.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\dynalink.md.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-3101-0000-1000-0000000FF1CE.xml.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusVL_KMS_Client-ppd.xrm-ms.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ospintl.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\ChakraCore.Debugger.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-time-l1-1-0.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\ReachFramework.resources.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Windows.Input.Manipulations.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\ja.pak.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Trial-ppd.xrm-ms.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Common Files\System\ado\msado15.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.WebClient.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-stdio-l1-1-0.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\colorimaging.md.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Client\AppvIsvSubsystems64.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest1-ppd.xrm-ms.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_Retail-ppd.xrm-ms.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WINWORD_COL.HXT.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcr120.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Principal.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\DATATRANSFORMERWRAPPER.DLL.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART14.BDR.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-100.png.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Reflection.DispatchProxy.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_OEM_Perp-pl.xrm-ms.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_SubTrial-ul-oob.xrm-ms.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Sort\TAG.XSL.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Threading.Thread.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Java\jdk-1.8\include\win32\jawt_md.h.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\lcms.md.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ul-phn.xrm-ms.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\offsymxl.ttf.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\WindowsBase.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Windows.Forms.Primitives.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Drawing.Design.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\VisualElements\SmallLogoCanary.png.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-handle-l1-1-0.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_MAK_AE-ul-phn.xrm-ms.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\POWERPNT_COL.HXC.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\UIAutomationTypes.resources.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\System.Windows.Forms.resources.dll.tmp 601a57dee73231e51a1ee2223b818110N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 601a57dee73231e51a1ee2223b818110N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5ded34cefdb944f6be3aa1ef2a36026f4
SHA174d5af20a5885e373c4c83d3878ae91faf973d86
SHA256a213b0de94bc05e2b425766d3edee2b978473a66d70df7a8cec2516354ac29b0
SHA512fb52adc6256e5ae5d3454fb0ef92bcb675c82cb544d5a19bcc74166da9007723c1f8e222af54af816b3f53f3f4e0b30b32c46bc9cc4583d6c57c430fdc2c8976
-
Filesize
145KB
MD5e51abf60171a716caeeb0dee1575ce49
SHA10b5407f71cf0d390e83af12227942421a64e8f9f
SHA256dfaf7a4c6c9be058c6aa302d8959da8dce6d0cfea1d530b627bc954ca04b7781
SHA5126b1aa6f61525012d8206babe82f704902533697629820df3b355af8482f08ff56019ec0fe71d25c2dd4e66de48c462d014bb72988b98601bafeb874fb59621a7