Analysis
-
max time kernel
119s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 07:30
Behavioral task
behavioral1
Sample
2b8482afcbac08d3d6c52bf384d910b0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b8482afcbac08d3d6c52bf384d910b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
2b8482afcbac08d3d6c52bf384d910b0N.exe
-
Size
59KB
-
MD5
2b8482afcbac08d3d6c52bf384d910b0
-
SHA1
f340118fafcba49387e0fcd80078e21d7ec1f317
-
SHA256
d5be8fae0ddf1f7a5dad8daf8323a18190c0fe3f71faa6714f3d5945c4ebd9af
-
SHA512
63c96cdf9ed1602e1f6b92d3de94feacc44430e0a6caaace79bc32d6fa599af6f8b38dc692800211cb5e0aac4cf0e4742fef9897f78c0f534433c8633d807337
-
SSDEEP
768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mdQ:V7Zf/FAxTWoJJZENTNyl2Sm0mdnwN1/
Malware Config
Signatures
-
Renames multiple (4650) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/3256-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000900000002340d-2.dat upx behavioral2/files/0x0014000000022912-6.dat upx behavioral2/memory/3256-866-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\UIAutomationClient.resources.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\UIAutomationClient.resources.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Calibri.xml.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdXC2RVL_KMS_ClientC2R-ppd.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\el-GR\tipresx.dll.mui.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.WebSockets.Client.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Xml.Linq.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\auxbase.xml.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-namedpipe-l1-1-0.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Author2XML.XSL.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Subtle Solids.eftx.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Trial-ppd.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest2-ul-oob.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-ul-phn.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\shaded.dotx.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Drawing.Primitives.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\UIAutomationProvider.resources.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\Office16\OSPP.VBS.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_Retail-ppd.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_Subscription-pl.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTrial-pl.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\PowerPivotExcelClientAddIn.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\ConvertJoin.cr2.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_fr.properties.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\System.Xaml.resources.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\XLINTL32.DLL.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Common Files\System\msadc\adcvbs.inc.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.ZipFile.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\nio.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_OEM_Perp-pl.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.NETCore.App.deps.json.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.AccessControl.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\ta.pak.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Grace-ul-oob.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_KMS_ClientC2R-ppd.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Retail-pl.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\7-Zip\Lang\ru.txt.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nb-no.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Retail-ppd.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Common Files\System\ado\msado15.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Java\jdk-1.8\bin\javadoc.exe.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_MAK-ul-oob.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Java\jdk-1.8\bin\rmid.exe.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Trial-ppd.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power View Excel Add-in\Microsoft.PowerBI.AdomdDataExtension.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-conio-l1-1-0.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\netstandard.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\PresentationFramework.resources.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-ul-oob.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_SubTrial-ppd.xrm-ms.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\PSRCHSRN.DAT.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.scale-140.png.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\msinfo32.exe.mui.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Diagnostics.Tracing.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\ReachFramework.resources.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\System.Windows.Forms.resources.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\UIAutomationProvider.resources.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\System.Windows.Input.Manipulations.resources.dll.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\VisualElements\SmallLogoBeta.png.tmp 2b8482afcbac08d3d6c52bf384d910b0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b8482afcbac08d3d6c52bf384d910b0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD51fcf6af40c345e4a2e43a5120115d4c5
SHA1bc472ca87f58f0a13fd277c5c7191491e66a6d75
SHA256c9781206b26a470828876febe1da7d7e370104a1f8357f3b6f58bc008e4fe40a
SHA512cd6cfa0bc3968e71af564d97ba823af960d56553f50a6cccf119929cbc481b6bcb152827479b51a6c08be15106507496f9192ce9cfb1b0d97ad590a3c2a6f480
-
Filesize
158KB
MD5615a0315629e852068e8d712e8978a0d
SHA1c05f9b8c9e732def728442260d9ef88c6a0e96d8
SHA25694369e9effc6540aaec258e7443ba57c199a9bac0a535500ca63c495797f475c
SHA5123261ccfa6c14cd4762a66ac92fa18375b5fe923a74a000cbe6e74cdc33b000e6f71a2a0b7927e83fdb88e0571557d1141ee23d15182882f1bc6c3a4242af8f12