Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 17:38
Static task
static1
Behavioral task
behavioral1
Sample
b88fceb4d6737aa3c7f4e91aaf879810N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b88fceb4d6737aa3c7f4e91aaf879810N.exe
Resource
win10v2004-20240802-en
General
-
Target
b88fceb4d6737aa3c7f4e91aaf879810N.exe
-
Size
103KB
-
MD5
b88fceb4d6737aa3c7f4e91aaf879810
-
SHA1
f27ecbc8dd359daa56980f7060f3fc3373af7581
-
SHA256
1989f488098ff0cb88a55f7e0405ef2c5d985a3ff0f2f10c2db2568fced5d830
-
SHA512
615394de05259790d7ef8ad70c49fb83b724bbc7462ad18689c88164ab07b22665c25cf879ab90852930d03002cc55b77ffbb15e7473515b974a9eb59c10d64a
-
SSDEEP
3072:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFslEhLfyBL:PqFF2Ie+efsim24
Malware Config
Signatures
-
Renames multiple (4469) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_OEM_Perp-ul-phn.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\UIAutomationProvider.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\Microsoft.VisualBasic.Forms.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_OEM_Perp-ul-oob.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\offsymk.ttf.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\concrt140.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\PresentationUI.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\xalan.md.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\UIAutomationTypes.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_SubTest-pl.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_MAK-pl.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Common Files\System\Ole DB\oledb32r.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\System.Windows.Input.Manipulations.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\MSOUC_COL.HXC.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\PresentationCore.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardMSDNR_Retail-ul-phn.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\WindowsFormsIntegration.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\UIAutomationProvider.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_ConsumerSub_Bypass30-ul-oob.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_OEM_Perp-ul-phn.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Retail-pl.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\7-Zip\7z.sfx.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\UIAutomationTypes.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\UIAutomationClientSideProviders.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_SubTest-pl.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.WebClient.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgeCallbacks.h.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_OEM_Perp-pl.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\Microsoft.VisualBasic.Forms.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\PresentationUI.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\pkcs11cryptotoken.md.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\EntityPickerIntl.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsptg.xml.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Common Files\System\Ole DB\es-ES\oledb32r.dll.mui.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-synch-l1-1-0.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail-ul-phn.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_BypassTrial180-ul-oob.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019DemoR_BypassTrial180-ppd.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_KMS_Client-ppd.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_OEM_Perp-ul-oob.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.cs-cz.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\System.Windows.Forms.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Java\jre-1.8\bin\jsound.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientEventLogMessages.man.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\MsoAriaCApiWrapper.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power View Excel Add-in\Microsoft.ReportingServices.Interfaces.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\mscordbi.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\currency.data.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_Retail-ul-phn.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Linq.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\PresentationUI.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\EXCEL.HXS.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\EXCELPLUGINSHELL.DLL.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.WebProxy.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Windows.Forms.Design.Editors.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial4-pl.xrm-ms.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\UIAutomationTypes.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-libraryloader-l1-1-0.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\public_suffix.md.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\UIAutomationClientSideProviders.resources.dll.tmp b88fceb4d6737aa3c7f4e91aaf879810N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b88fceb4d6737aa3c7f4e91aaf879810N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD57411e6704e8ed8a9941dbf97c59b2a5b
SHA1dbaa155ad8d9ddb9a80b5775d518c5266deca76e
SHA2567e8ab23cff99e84d0e941fb2fae336893fa28a704c772ce275d0dc3c09b2312b
SHA5125eb8bf1f4d0568338c5b0850d7b874aa2021a7fe49e70340ca9adab07d5ef65ae706a5ce33c17ae1386a00d36347984707aaaa402388457c811a99702240db49
-
Filesize
202KB
MD5477489955c914e919e6add245816f32e
SHA172b720852bf61cd0915925d124a10c1f02a4b073
SHA256126e3a0e4605e13f85cd7b82f94e1872f9593aa23c19db0038298e32f4dd0696
SHA512269401c7bebed46f1494976b2ea411829524671fe62e679a53e842d2ee10f40ac5c094fa2d77538e9354f22b1e10af41f2d96b30b89ef35febb0175a16c40780