Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 23:10
Behavioral task
behavioral1
Sample
a2b97584c82c862a25aa76e658a621c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a2b97584c82c862a25aa76e658a621c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a2b97584c82c862a25aa76e658a621c0N.exe
-
Size
29KB
-
MD5
a2b97584c82c862a25aa76e658a621c0
-
SHA1
54da3dd6bc7a48b79a989705418efad20da9185e
-
SHA256
f486564239441eeb454c3d4c918df81f7613080220c31b5d1cd495d3c28ba8ae
-
SHA512
e83a5e98515dc0a4a1d009ba56412bd6e0b34bfdaba74da529cd53123c066269961ab9ab32cf8c644ff3e07e40ff0770b57148d1347e27684341ce6c70bcbd8b
-
SSDEEP
768:kBT37CPKKdJJ1EXBwzEXBwdcMcI99ui1xDui1x/:CTW7JJ7T/F/Fz
Malware Config
Signatures
-
Renames multiple (4483) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/4948-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x000900000002342d-2.dat upx behavioral2/files/0x00040000000228f4-6.dat upx behavioral2/memory/4948-874-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\cy.txt.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\7-Zip\Lang\ga.txt.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-multibyte-l1-1-0.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O16ConsumerPerp_Bypass30-ul-oob.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_MAK_AE-ppd.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-white_scale-80.png.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\7-Zip\7-zip.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ko-KR\tipresx.dll.mui.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\UIAutomationTypes.resources.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O16ConsumerPerp_Bypass30-ppd.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_KMS_Client_AE-ul-oob.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTest-ppd.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-math-l1-1-0.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Reflection.DispatchProxy.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\System.Windows.Input.Manipulations.resources.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-stdio-l1-1-0.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Trial-pl.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_Subscription-ul-oob.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_KMS_Client_AE-ul-oob.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Common Files\System\msadc\msdaprsr.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-interlocked-l1-1-0.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\splash_11-lic.gif.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_KMS_Client_AE-ppd.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-multibyte-l1-1-0.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-black_scale-100.png.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-80.png.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\7-Zip\Lang\be.txt.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\7-Zip\Lang\et.txt.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-file-l1-1-0.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Drawing.Common.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\VisualElements\SmallLogo.png.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019R_Retail-ul-phn.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipscat.xml.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\UIAutomationClient.resources.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\ReachFramework.resources.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\Microsoft.VisualBasic.Forms.resources.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\WindowsFormsIntegration.resources.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-file-l2-1-0.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Java\jre-1.8\bin\ssvagent.exe.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_PrepidBypass-ppd.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdVL_MAK-pl.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\7-Zip\Lang\br.txt.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\7-Zip\Lang\is.txt.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Java\jdk-1.8\bin\rmic.exe.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_KMS_Client-ul-oob.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_KMS_ClientC2R-ppd.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Excel.MDXQueryGenerator.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\offsyml.ttf.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.Serialization.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\UIAutomationClient.resources.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientOSub_eula.txt.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\7-Zip\7-zip.chm.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.Cryptography.Encoding.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\Microsoft.VisualBasic.Forms.resources.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\US_export_policy.jar.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest2-ppd.xrm-ms.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\offsymt.ttf.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\PresentationFramework.resources.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\D3DCompiler_47_cor3.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Internet Explorer\ja-JP\iexplore.exe.mui.tmp a2b97584c82c862a25aa76e658a621c0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\sawindbg.dll.tmp a2b97584c82c862a25aa76e658a621c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2b97584c82c862a25aa76e658a621c0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD553db58c51aadc49c4523a21a3e2a84d3
SHA17a6093249b6c74b63dc2ca74404dafd5c5d792d0
SHA2561ca38c33bdaa56793bffdc4480b34d132dadc24e93e2f03c2c2758c0ecae1023
SHA512189c46d9d6ab2e1b875bfee25b04e6686c59b219a92895dc146e52f7691c004a21620e58682e0677da8da9623376d910aae86644a2e8dbd162442acc792021ba
-
Filesize
128KB
MD5148615608b61b79c61efb925c3ceb67d
SHA16717f574ced0528898a38a53087d0c8276cd5827
SHA2568f33ecb991eaa27a0da53c33f7ed71ee6019dc0dc1a7035c191a77d9dbb14e26
SHA512a930fc03b18cdd714271e9a97fe5fedfcaa6f80e3c6549ae765f6c96c8bb5f0eb70a98ef5a13fa03aae797202ffff39e1652bbc57ce6141fc1006c89919aa6b3