Analysis
-
max time kernel
119s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 05:23
Behavioral task
behavioral1
Sample
77f091a31c2b4c15ae221735bb143bb0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
77f091a31c2b4c15ae221735bb143bb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
77f091a31c2b4c15ae221735bb143bb0N.exe
-
Size
40KB
-
MD5
77f091a31c2b4c15ae221735bb143bb0
-
SHA1
f8e60bb17124a632b0b8c43566e73ab18c484f77
-
SHA256
307d7d97ffa296add6a4789a00608b82d017c43250f7b04fe35d48ffcc404cc8
-
SHA512
3ae9b49f9a3b97d18ae661c384ffd3ed52e7e3f002e8c899b587489b1249df81b3095d33dc1f016070b6be9ce56b718bdf8685d3ca24aa543b688314202e7e31
-
SSDEEP
768:kBT37CPKKdJJTU3U2lRtJfOKI+D9Ii1xsI+D9Ii1xNHQ:CTW7JJTU3UytJfOKI+h/YI+h/Bw
Malware Config
Signatures
-
Renames multiple (487) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x0002000000010480-6.dat upx behavioral1/files/0x000d000000012262-2.dat upx behavioral1/memory/2784-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2784-27-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\System\msadc\msdarem.dll.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Bear_Formatted_MATTE2_PAL.wmv.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\it.pak.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\glass.dll.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\7-Zip\Lang\it.txt.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\System\ado\msadrh15.dll.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\es.pak.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\th.pak.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_it.jar.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\correct.avi.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tabskb.dll.mui.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\IpsMigrationPlugin.dll.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\System\Ole DB\ja-JP\sqloledb.rll.mui.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\ExpandComplete.eprtx.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_photo_Thumbnail.bmp.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\7-Zip\Lang\ro.txt.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\TipBand.dll.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\msinfo32.exe.mui.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Shorthand.emf.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_VideoInset.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\15x15dot.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\userContent_16x9_imagemask.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.exe.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Internet Explorer\iediagcmd.exe.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\7-Zip\Lang\ast.txt.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\tabskb.dll.mui.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationUp_SelectionSubpicture.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationRight_ButtonGraphic.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047_576black.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationLeft_SelectionSubpicture.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Java\jdk1.7.0_80\include\classfile_constants.h.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\7-Zip\Lang\vi.txt.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_INTRO_BG.wmv.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\SmallLogoDev.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\System\Ole DB\ja-JP\msdasqlr.dll.mui.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\fr-FR\WMM2CLIP.dll.mui.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\vistabg.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\en-US.pak.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\7-Zip\Lang\sv.txt.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\offfiltx.dll.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipTsf.dll.mui.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwritash.dat.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsdan.xml.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_LOOP_BG.wmv.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\203x8subpicture.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationLeft_SelectionSubpicture.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Internet Explorer\ieinstal.exe.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\7-Zip\Lang\sa.txt.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\7-Zip\Lang\uz-cyrl.txt.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\directshowtap.ax.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationRight_SelectionSubpicture.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialoccasion.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\whitevignette1047.png.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\Filters.xml.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\hu.pak.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsNotesBackground.wmv.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\EnterConnect.avi.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\JAWTAccessBridge-64.dll.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jfxmedia.dll.tmp 77f091a31c2b4c15ae221735bb143bb0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77f091a31c2b4c15ae221735bb143bb0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD50a9c78828458d8b5647de56f89deb71f
SHA114bb487af5bd4be18c6c64dd67f71c1d3349db5b
SHA25617371b81e50f577e2aa9d0c783b188533c5b485b57ba9a694b54f3f754b61937
SHA512d614fb885d3358d44fe878011fa92e22e293c46eb1b5f0a0426bbf75cf44b86d18c32dbbc12921cdc95abed56d8b455128ef0e8c386e2c6ebfbb83f44e758fff
-
Filesize
49KB
MD5e17db944aca0b4d9951eb1d3ba39e09e
SHA1e3db9cccf796775b765a890f5cd5f7febb822b5d
SHA256e7a29ec6eb9ac9351c8c5eb7d3acf2eeba63a1cfeadaa5b2fb7393496b6be8bd
SHA5126b068ac55336ea60e13ea82196479dd2ec69650c0a4f4be55debdf6dc7403d08fd4d41649e75c9b4702e62f9d831dffa8942b87cc9936ed078e755bf118a7284