Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 09:44
Behavioral task
behavioral1
Sample
d1ba777bf479cdccf599fc549e712050N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d1ba777bf479cdccf599fc549e712050N.exe
Resource
win10v2004-20240802-en
General
-
Target
d1ba777bf479cdccf599fc549e712050N.exe
-
Size
85KB
-
MD5
d1ba777bf479cdccf599fc549e712050
-
SHA1
fb00eec7d51370cc56d9a512b8e55f8d2f4456ff
-
SHA256
8127ddff59c77b2719b2b9b0fd25a9b9b38073ce545bc9282b96791e245729cf
-
SHA512
406ecb955b90e63c51182a89bb16276f248e77ba4832b5c7aa0d0eafabae298edb146215d4e694736d1c19376d642c44ab7c3f92b87f5f755a1ac319be4adf1c
-
SSDEEP
1536:V7Zf/FAxTWoJJB7LD2I2IbSaTW7JJB7LD2I2IbS0pW:fny1tD33bS5tD33bS0pW
Malware Config
Signatures
-
Renames multiple (4608) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/1900-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000a0000000228c9-2.dat upx behavioral2/files/0x00040000000228de-6.dat upx behavioral2/memory/1900-868-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.Compression.Native.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\UIAutomationTypes.resources.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\UIAutomationClient.resources.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_KMS_Client-ppd.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Reflection.Metadata.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\PresentationUI.resources.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Java\jdk-1.8\include\jni.h.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_KMS_Client_AE-ul.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\TipRes.dll.mui.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\D3DCompiler_47_cor3.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\javafx\gstreamer.md.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsid.xml.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Internet Explorer\en-US\iexplore.exe.mui.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Java\jre-1.8\lib\jfr\profile.jfc.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription4-ul-oob.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_SubTrial-ul-oob.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_altgr.xml.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.InteropServices.RuntimeInformation.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.IsolatedStorage.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_ghost_school.png.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Common Files\microsoft shared\ink\tabskb.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Common Files\System\de-DE\wab32res.dll.mui.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.dcfmui.msi.16.en-us.xml.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentDemoR_BypassTrial180-ppd.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_Grace-ppd.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_SubTest-pl.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Diagnostics.StackTrace.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\PresentationUI.resources.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\UIAutomationClient.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\cryptix.md.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordVL_MAK-ul-phn.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Diagnostics.StackTrace.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\PresentationCore.resources.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\Microsoft.VisualBasic.Forms.resources.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Common Files\System\msadc\it-IT\msdaremr.dll.mui.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\VisualElements\SmallLogo.png.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\logging.properties.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Common Files\System\Ole DB\msdaosp.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019VL_MAK_AE-ppd.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\offsym.ttf.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_OEM_Perp-ppd.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_SubTrial-ppd.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\7-Zip\Lang\lt.txt.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Private.DataContractSerialization.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.ReaderWriter.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.XDocument.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\attach.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Ion.thmx.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-black_scale-100.png.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.scale-100.png.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\MSIPCEvents.man.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.ComponentModel.TypeConverter.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Resources.Extensions.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Java\jdk-1.8\bin\jps.exe.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_MAK_AE-ul-phn.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-white_scale-100.png.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Collections.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.CompilerServices.VisualC.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\PresentationCore.resources.dll.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Java\jre-1.8\bin\javacpl.cpl.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-ppd.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_KMS_Client_AE-ul-oob.xrm-ms.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Office16\MEDIA\TYPE.WAV.tmp d1ba777bf479cdccf599fc549e712050N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\da\msipc.dll.mui.tmp d1ba777bf479cdccf599fc549e712050N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1ba777bf479cdccf599fc549e712050N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD530c630103c87a328cc8480beb81d0971
SHA137b83ce6469ae0363053b56afc9769aa4a04bf77
SHA256aff86da42e637bc586df9f10fe45cc7bf218b9fc1f0d91f8b72a23613c75e9c5
SHA512f0fdfc3745555bf48ab13e3a10b01bfac1d09a4dd39c8ebf8d606093e647f87525a4612d00341874a8fafe8d7d4f40129f94aa25a92ad537c528ffe7fe37611b
-
Filesize
184KB
MD54e0b99031c9fc27ccf29e613d5175a26
SHA1b1c505e22d5b248a6287d53b6780edd9ff88c78e
SHA256dd3fae1918294b9753cc5385c2bcc08b7a8d836a9b2860b005c8accdaf4c66e4
SHA512b2bef9cf5261ca9d0fc52b47abf87dc14c005e9cafd6ad995d8355b95ddc9642658a754ffada5c22a7abf9076ac5d1e18e46a6a8ac07800d3b53843014d11e85