Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 02:35
Behavioral task
behavioral1
Sample
3f13b07ca0dfb106945e51c6d4d80a50N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f13b07ca0dfb106945e51c6d4d80a50N.exe
Resource
win10v2004-20240802-en
General
-
Target
3f13b07ca0dfb106945e51c6d4d80a50N.exe
-
Size
65KB
-
MD5
3f13b07ca0dfb106945e51c6d4d80a50
-
SHA1
ff9fa288fd3e3e64bd4dfaeaeea073a8b9efa17c
-
SHA256
6310afeb10243f67d2a82cec0baa4b35420598b0cf9a6c80d28a0fa0499253f0
-
SHA512
3a1c1bc9b78f54ce08b6cf0e81c1300e64a5e028782941d4b9f5e1f5f63aa6fc1fa02a3a3cb8e330bf9e77455370921d55d032aa80de8d656cab338e287807b8
-
SSDEEP
768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzk:CTWn1++PJHJXA/OsIZfzc3/Q8zxY5Z3t
Malware Config
Signatures
-
Renames multiple (4647) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/4968-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x00080000000234c5-2.dat upx behavioral2/files/0x000c0000000220a6-6.dat upx behavioral2/memory/4968-902-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\ShapeCollector.exe.mui.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Xml.XPath.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Java\jdk-1.8\bin\jdb.exe.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Java\jre-1.8\bin\unpack.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp3-ppd.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordR_Grace-ppd.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hu-hu.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Retail-ul-oob.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.WebSockets.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgeCalls.c.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_MAK-ppd.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.et-ee.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\relaxngom.md.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\PresentationFramework.Aero.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Threading.AccessControl.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\management.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription5-ppd.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipssrl.xml.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-synch-l1-1-0.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\System.Windows.Controls.Ribbon.resources.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\System.Windows.Controls.Ribbon.resources.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_MAK_AE-ul-phn.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe.manifest.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.scale-80.png.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui.xml.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.proofing.msi.16.en-us.xml.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ul-oob.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\splashscreen.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Retrospect.thmx.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019MSDNR_Retail-ppd.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\lv.pak.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.Win32.Registry.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.Intrinsics.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Java\jre-1.8\legal\javafx\libffi.md.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_Trial-ul-oob.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\GRLEX.DLL.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Resources.ResourceManager.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Xml.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\UIAutomationTypes.resources.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Java\jdk-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Frosted Glass.eftx.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\offsymb.ttf.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\TipRes.dll.mui.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Diagnostics.StackTrace.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Trial-ppd.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp-ppd.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Text.Encoding.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-console-l1-1-0.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Diagnostics.DiagnosticSource.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationFramework.Aero.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_MAK-ul-oob.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Data.OData.NetFX35.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-white_scale-180.png.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial2-ppd.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Grace-ul-oob.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\UIAutomationTypes.resources.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\content-types.properties.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_SubTrial-pl.xrm-ms.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\MSQRY32.CHM.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\eu\msipc.dll.mui.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.ComponentModel.DataAnnotations.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.Pipes.AccessControl.dll.tmp 3f13b07ca0dfb106945e51c6d4d80a50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f13b07ca0dfb106945e51c6d4d80a50N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5f740d1b65c850fb12f8285573ac73d48
SHA1ed6fed0f3e10758776f96b0cff2f5e0594bdff87
SHA2565f7c2be0b05af0807d1afd3fe5b22bce77e76e09785b2c26bc3ed6db595f3842
SHA512851fc617b43cfeae7376218686d7b57520a3f8a090db02a27777caefc18d89481c91d7330db025c872e54568ce8d3f825c501aec04436a04377febef4a85fd27
-
Filesize
164KB
MD5f31a6048320f2cb736ad891449b575e0
SHA16f6db1fdecfba3ad08f8fb77ca4032df49c65dd8
SHA256abad7434a2b06fa73e2e08d4a25a9119e684ef0f7609f20735863d0f62b935de
SHA512d11b156fd14dabb4d11d757e52d91d6ca19d5c877bd017d7f03622029b2ec16fd5ba1bcd2291594a093146e322e4a038db4d83bdf73dbe4c568b852d15b7fce5