Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 00:13
Behavioral task
behavioral1
Sample
1790c4ec0c85cc3f3ae9f221807cd890N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1790c4ec0c85cc3f3ae9f221807cd890N.exe
Resource
win10v2004-20240802-en
General
-
Target
1790c4ec0c85cc3f3ae9f221807cd890N.exe
-
Size
35KB
-
MD5
1790c4ec0c85cc3f3ae9f221807cd890
-
SHA1
9201afaf685b5622d7197f6f0aa2f94d0ffd7373
-
SHA256
934ff80e6975a2bb443d570905146aaf5d9ead3efe72619ebd6dfbd94d88a783
-
SHA512
d78f8220a8a098f9e9f931eec98883b7d39556731a56121cba58ca8273eb55ce007e6246f5ced0750a5db459d6772d9d154d6ce28179a65e348096669f560555
-
SSDEEP
768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiw:CTW7JJ7TTQoQw
Malware Config
Signatures
-
Renames multiple (4671) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/1388-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x00090000000233bc-2.dat upx behavioral2/files/0x00040000000228f4-6.dat upx behavioral2/memory/1388-1002-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\PresentationFramework.resources.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\hi.pak.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription4-pl.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-pl.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\PSRCHLEX.DAT.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Office16\GKPowerPoint.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial2-pl.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTest-ul-oob.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.DiaSymReader.Native.amd64.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.ComponentModel.EventBasedAsync.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.Requests.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationNative_cor3.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdCO365R_Subscription-ul-oob.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_Grace-ppd.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcp120.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\ReachFramework.resources.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy.jar.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\System.Windows.Forms.Design.resources.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\ReachFramework.resources.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\UIAutomationClient.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Java\jdk-1.8\bin\ktab.exe.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\logging.properties.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Java\jre-1.8\bin\server\jvm.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Trial-pl.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\XLLEX.DLL.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\tabskb.dll.mui.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\.version.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\System.Xaml.resources.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\win32_LinkDrop32x32.gif.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Java\jdk-1.8\lib\jconsole.jar.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Java\jdk-1.8\THIRDPARTYLICENSEREADME.txt.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationFramework-SystemData.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Windows.Forms.Design.Editors.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Windows.Forms.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Localytics.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\Microsoft.CSharp.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Cryptography.OpenSsl.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\System.Windows.Input.Manipulations.resources.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Java\jdk-1.8\lib\packager.jar.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ul-phn.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-tw.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\System.Windows.Forms.Design.resources.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Java\jre-1.8\bin\WindowsAccessBridge-64.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\th\msipc.dll.mui.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Text.Encodings.Web.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\Microsoft.VisualBasic.Forms.resources.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Java\jdk-1.8\jre\COPYRIGHT.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteFreeR_Bypass-ppd.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Trial-ppd.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_MAK_AE-ul-phn.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Common Files\microsoft shared\ink\tpcps.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\sawindbg.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-3101-0000-1000-0000000FF1CE.xml.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial3-ul-oob.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProMSDNR_Retail-pl.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_Subscription-ppd.xrm-ms.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-processthreads-l1-1-0.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-processenvironment-l1-1-0.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\Common Files\microsoft shared\ink\mip.exe.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\netstandard.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Linq.Parallel.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.NetworkInformation.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Xml.XDocument.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationFramework.dll.tmp 1790c4ec0c85cc3f3ae9f221807cd890N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1790c4ec0c85cc3f3ae9f221807cd890N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD535f5d48d8bedf1e286a0e749e66f1e9a
SHA1164fa1bb2a4b8f13a583bbd1ec440b72073aa3e1
SHA256dcd6bf49e3344c8697dde31b3df560b06e48cfbc26710d5c0e2aa4fec2248454
SHA5125e6ecb9adfc522c97c4bd39e0a495ec571104f873d5c5d2c9500122ec94d46145a6ca4ad353f4da1cf86ee3c4e480ad9d725355516c9de5c45eaf26fb29848a1
-
Filesize
134KB
MD5919faffa0596269aea63901f77d0a95b
SHA1e1f19385cff27bf2924d28f26334f0591e006029
SHA2566754139f9358d4d2504e2a9f27bf58c48cf6ddfaaac9202c80cfc5df2c9a1405
SHA51201e53907037b27462826c89db94368bb68a1abb9e5a4a0b844304c62694f81ef1666b6150897548158e850edef1f35c2ac77fa4036db28eda6f7cb5c6a18a1f8