Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 17:26
Behavioral task
behavioral1
Sample
77aa964b7c99628603a0d482e64158d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
77aa964b7c99628603a0d482e64158d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
77aa964b7c99628603a0d482e64158d0N.exe
-
Size
67KB
-
MD5
77aa964b7c99628603a0d482e64158d0
-
SHA1
940f1f032ebfca4014c888caeab33796138670b7
-
SHA256
23cef7caa89e178965930bc7258676f67a54f52567292f67514e4626000b39f0
-
SHA512
35939c3aaf70a2c3d71e87ed10c2ba51a8744254cf6555369900d3bc7ba7c3d1092042ba92a4cce2824cab73904805fe7d142c84e173add2315cea5aaaa3ebd2
-
SSDEEP
768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKTZQZ1+:V7Zf/FAxTWoJJZENTNyoKIKt
Malware Config
Signatures
-
Renames multiple (348) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/memory/2724-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/files/0x000c000000017444-2.dat upx behavioral1/files/0x0002000000010480-6.dat upx behavioral1/memory/2724-26-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\nn.txt.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\TipBand.dll.mui.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationRight_SelectionSubpicture.png.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationUp_SelectionSubpicture.png.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-highlight.png.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\ShapeCollector.exe.mui.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Trans_Scene_PAL.wmv.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\System\msadc\de-DE\msdaprsr.dll.mui.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\pushplaysubpicture.png.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Internet Explorer\jsdbgui.dll.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\7-Zip\Lang\uz.txt.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\System\Ole DB\sqloledb.rll.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\sk.pak.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ta.pak.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\imjplm.dll.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Music.emf.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsScenesBackground.wmv.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\he.pak.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Google\Chrome\Application\chrome.exe.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\dicjp.bin.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Services\verisign.bmp.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\System\es-ES\wab32res.dll.mui.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\System\wab32.dll.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047x576black.png.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047_576black.png.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ru.pak.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\7-Zip\Lang\hy.txt.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_ca.xml.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\th.pak.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\7-Zip\7zFM.exe.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\tipresx.dll.mui.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Sand_Paper.jpg.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\de-DE\DVDMaker.exe.mui.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationRight_ButtonGraphic.png.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\correct.avi.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mip.exe.mui.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrfrash.dat.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\VSTOInstallerUI.dll.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationRight_SelectionSubpicture.png.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\rtscom.dll.mui.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\System\ado\msadomd28.tlb.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\cloud_Thumbnail.bmp.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\am.pak.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsen.xml.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\mraut.dll.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\MSTTSEngine.dll.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\reflect.png.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Internet Explorer\perfcore.dll.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\System\ado\de-DE\msader15.dll.mui.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\System\msadc\msadcer.dll.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\it.pak.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwresplm.dat.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationUp_ButtonGraphic.png.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\videowall.png.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\mshwLatin.dll.mui.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\System\ado\msadomd.dll.tmp 77aa964b7c99628603a0d482e64158d0N.exe File created C:\Program Files\Common Files\System\Ole DB\ja-JP\sqloledb.rll.mui.tmp 77aa964b7c99628603a0d482e64158d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77aa964b7c99628603a0d482e64158d0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD55e0a78e49f571bf46b091a76dcef1ca7
SHA150dd7f5c882c9d67a86b8b7b6a31862f742c26fa
SHA25668fe8fbede94a267e211e241ce745929a522d103995c188165507e90ad5c5af4
SHA5125551acfb51bda2969d3ebbc4032e7e3d5bb0c6172cd5642fb94155c104c1e92509d3d28ab9d471aaf0bb00848c3703332e86a5b2c2d495c69dc8b16677bf3f02
-
Filesize
76KB
MD5c74485948f90ca1a724b15561460346b
SHA1081f18ed11b39efa526e0af2db8274287bbdf3f2
SHA256dd34d079999ef83c86077bfee4ef6492d3da3ea4953cdaa29ede6da20a88a795
SHA512d6352a37318ba6ffa08a10e1f391b02c9290f814823a596086f997b1e590598b0a1471feabb2834891e6e395f4eac3e39b2ca7092abb1082ca3a44fb205bc98b