Analysis
-
max time kernel
119s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:20
Behavioral task
behavioral1
Sample
fbb84ceb67bff40bbd47b1dfe1e211a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fbb84ceb67bff40bbd47b1dfe1e211a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
fbb84ceb67bff40bbd47b1dfe1e211a0N.exe
-
Size
27KB
-
MD5
fbb84ceb67bff40bbd47b1dfe1e211a0
-
SHA1
23c006da0e9773436d17b49b30816995cec5011f
-
SHA256
30b358c3abaf8a757285d02cd523afdc31ab3eac8bb82917c51b3b35b5637a39
-
SHA512
ab4fcc89ceed7a1488fa9b983648351627b545c6cbafa62067e13f6db10dfc45efe0bba9c7a0f168e3ebed710df8fcff100399c8cf28e807009f1392bb867b9b
-
SSDEEP
768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9HSXM2MN:CTW7JJ7T1Ss
Malware Config
Signatures
-
Renames multiple (4680) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/2700-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x00080000000234d5-2.dat upx behavioral2/files/0x0004000000022922-6.dat upx behavioral2/memory/2700-936-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\System.Windows.Controls.Ribbon.resources.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.cpl.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Violet II.xml.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\msquic.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Collections.Specialized.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.NameResolution.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\UIAutomationTypes.resources.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\Classic.dotx.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\Microsoft.Office.Tools.Common.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\7-Zip\Lang\sr-spc.txt.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Diagnostics.FileVersionInfo.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\WindowsFormsIntegration.resources.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipscat.xml.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipshe.xml.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\WidevineCdm\manifest.json.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_OEM_Perp-ul-oob.xrm-ms.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-ul-oob.xrm-ms.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\TellMeWord.nrr.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\am.pak.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Java\jre-1.8\lib\ext\nashorn.jar.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Client\api-ms-win-core-file-l2-1-0.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Diagnostics.EventLog.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Retail-ul-phn.xrm-ms.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_OEM_Perp-ul-phn.xrm-ms.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\7-Zip\Lang\kk.txt.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\mscorrc.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Xml.XmlSerializer.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\netstandard.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\UIAutomationTypes.resources.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessR_OEM_Perp-ppd.xrm-ms.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Retail-ul-oob.xrm-ms.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power View Excel Add-in\Microsoft.Reporting.AdHoc.Shell.Bootstrapper.xap.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\TipRes.dll.mui.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Common Files\microsoft shared\VGX\VGX.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Common Files\System\Ole DB\sqlxmlx.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationCore.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\sunmscapi.jar.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Java\jre-1.8\bin\jawt.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Private.CoreLib.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Numerics.Vectors.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.Extensions.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Office16\OCSCLIENTWIN32.DLL.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\System.Windows.Forms.Design.resources.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\mesa3d.md.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019DemoR_BypassTrial180-ul-oob.xrm-ms.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages_it.properties.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Java\jre-1.8\bin\glass.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial3-pl.xrm-ms.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O16EnterpriseVL_Bypass30-ppd.xrm-ms.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Subscription-pl.xrm-ms.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription2-pl.xrm-ms.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\it\msipc.dll.mui.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ru-ru.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\PresentationCore.resources.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0016-0000-1000-0000000FF1CE.xml.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\ReachFramework.resources.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Client\mfc140u.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_Grace-ul-oob.xrm-ms.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTrial-ul-oob.xrm-ms.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R64.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.Security.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Cryptography.Algorithms.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\ReachFramework.resources.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-interlocked-l1-1-0.dll.tmp fbb84ceb67bff40bbd47b1dfe1e211a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbb84ceb67bff40bbd47b1dfe1e211a0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5d4ad70ed61d1a5d7404bcba9e06dcbeb
SHA1eab0996ed7bba1267826f2d37d724f2243110760
SHA2563f4d73e8f2d87a808aca78cbf6bf458a60d913cb431f01c9f634e148fd6ae593
SHA512d1322b2adff0e09e3c81d2d560225c840a7beebdafece12cfc63fe31a94d2ffef166a7850909311f51acdf03d8927709f59dc281ebf56dc91d73164f687ad1d7
-
Filesize
126KB
MD589f2ef71d1a22a9b9ce325f2d4a91075
SHA1e6b86d05f6ba760912801fd6c649192e03d110ee
SHA256069e381e4de851ac279077e7ff495804921666f21bfff3d1dc06da3b3fbc9574
SHA512781e80dac6f1c371be00343520e39ec46ffb1a8269f0bec9d3642bd17853ae923a0b44823120092458e517f2e80d23fc484396a312e333591354de89ebcf1ae3