Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 02:54
Behavioral task
behavioral1
Sample
cd8b60a6a5ff694b8491c45fa0cb6c30N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cd8b60a6a5ff694b8491c45fa0cb6c30N.exe
Resource
win10v2004-20240802-en
General
-
Target
cd8b60a6a5ff694b8491c45fa0cb6c30N.exe
-
Size
69KB
-
MD5
cd8b60a6a5ff694b8491c45fa0cb6c30
-
SHA1
c9d411e02f7ed6a7e011a6aed38f011591f46333
-
SHA256
a7b9983f9a69f421b96ac34d740ca5976001ebae07daf4744ff7679ea211cb7a
-
SHA512
7e4dd888f5fc2bdc9b865eba0a3734123c1c40bdf162597b755ae2452054448b9c8b3eeda1e8da64043ae2b13a66f85e626f30806b9f40aa41f4d1300fcc9fcf
-
SSDEEP
1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8Q8/8fCZ:enaypQSoska
Malware Config
Signatures
-
Renames multiple (4660) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/4328-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x00090000000233f0-2.dat upx behavioral2/files/0x000c0000000220a6-6.dat upx behavioral2/memory/4328-1914-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\ta.txt.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.Win32.Primitives.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-pl.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-ul-oob.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Resources.Reader.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\ReachFramework.resources.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-crt-locale-l1-1-0.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\local_policy.jar.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-timezone-l1-1-0.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019VL_MAK_AE-pl.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Data.ConnectionUI.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-100.png.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcp120.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ru\Microsoft.VisualBasic.Forms.resources.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\ReachFramework.resources.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\System.Windows.Forms.resources.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\EXCEL_F_COL.HXK.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSOARIANEXT.DLL.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\7-Zip\Lang\da.txt.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Globalization.Calendars.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\javafx\libffi.md.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O16ConsumerPerp_Bypass30-ppd.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription3-ppd.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_MAK-ppd.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsesp.xml.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\System.Windows.Forms.Primitives.resources.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ul-oob.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp-ppd.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Grace-ppd.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Office16\1036\MSO.ACL.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsptb.xml.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\LucidaBrightItalic.ttf.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_KMS_Client-ul.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Common Files\microsoft shared\ink\zh-CN\tipresx.dll.mui.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\xerces.md.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_SubTest-ppd.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-MX\tipresx.dll.mui.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\System.Windows.Forms.Design.resources.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\System.Windows.Forms.Primitives.resources.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\VISUALIZATIONENGINE.DLL.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\msvcr120.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\WindowsFormsIntegration.resources.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001B-0409-1000-0000000FF1CE.xml.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\UIAutomationClient.resources.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Java\jre-1.8\bin\jp2iexp.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\LucidaSansRegular.ttf.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Java\jre-1.8\lib\jfr.jar.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest4-pl.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardMSDNR_Retail-pl.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_ghost_school.png.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\7-Zip\Lang\ru.txt.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.FileSystem.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Configuration.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.Serialization.Xml.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Security.Cryptography.Pkcs.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\PresentationUI.resources.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\fonts\LucidaTypewriterBold.ttf.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\clrjit.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\System.Xaml.resources.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTrial-ul-oob.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.Principal.Windows.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\UIAutomationProvider.resources.dll.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_MAK-ul-phn.xrm-ms.tmp cd8b60a6a5ff694b8491c45fa0cb6c30N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd8b60a6a5ff694b8491c45fa0cb6c30N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5c618df8d9092cf5cab410c3803bbb842
SHA14343fa5da1f445c7962a15ab511798b098b5bf9c
SHA256f181106763fc1bb5b3750ca5a6505fe3891dffc098ec757951a4ad4ce66ce045
SHA5122edee6c78b968e9f8ba1f79efd985883459c14ff72936ed7204057748be081b50d0ceb0153870919fd946a07967b7ca38c68004399814b25d605bd63ba036e5e
-
Filesize
168KB
MD54fca82127b14f389ef03a095dcf0ceba
SHA1a623ca98c50e33a402cf6ce3478de16c641aad07
SHA2561400ace860813c54891ea37724a4df8ec44eba532929b4d503ffffbdc37752f2
SHA512f6fccd8880d98bfa61c6e570c87dd52412c99d7b2c4b2c9c0bcced9738bdf52c34c9570bec0f91ce63d27d8a521ea50015b2520f210bf7fc0278ef31a2b0c915