Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 09:20
Behavioral task
behavioral1
Sample
4b2b256a81b429c0764ab7302aa19170N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4b2b256a81b429c0764ab7302aa19170N.exe
Resource
win10v2004-20240802-en
General
-
Target
4b2b256a81b429c0764ab7302aa19170N.exe
-
Size
54KB
-
MD5
4b2b256a81b429c0764ab7302aa19170
-
SHA1
f2740b90f23580e584036bebbb733ae03da7ae08
-
SHA256
001e592e1a99ffdf1b5f778c4819302c64c549d6ad31c4fdb4f5b8ea9c16a2c0
-
SHA512
3785054ea8527d770372f66e732f336ae088ece3f1b3b1b64aba728541d066fa352d6f3a6018e89976d3605d982e2ea7c48e525558b1cbfd7d2351e0fc6799e3
-
SSDEEP
768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9DJKGJK9/YzT7zTs:V7Zf/FAxTWoJJ7ThJKGJK3
Malware Config
Signatures
-
Renames multiple (4617) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/4400-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x00090000000236cb-2.dat upx behavioral2/files/0x000600000001690a-6.dat upx behavioral2/memory/4400-858-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Office16\1033\BHOINTL.DLL.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\EXCELPLUGINDATAPROVIDER.DLL.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-multibyte-l1-1-0.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest1-ppd.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial1-pl.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\BCSRuntimeRes.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\cldr.md.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Client\AppVLP.exe.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Retail-pl.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\7-Zip\Lang\en.ttt.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Common Files\microsoft shared\ink\TipRes.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\mscordaccore.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.InteropServices.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Office16\Document Parts\1033\16\Built-In Building Blocks.dotx.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\en-us\msipc.dll.mui.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\7-Zip\Lang\ka.txt.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\7-Zip\Lang\sr-spl.txt.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\WindowsBase.resources.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Grace-ul-oob.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_OEM_Perp-ppd.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremDemoR_BypassTrial365-ppd.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Grace-ul-oob.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Common Files\System\Ole DB\de-DE\sqloledb.rll.mui.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.Xaml.resources.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\System.Windows.Forms.resources.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail3-ul-phn.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\InputPersonalization.exe.mui.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\Microsoft.VisualBasic.Forms.resources.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-black_scale-180.png.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ONINTL.DLL.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVOrchestration.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\UIAutomationProvider.resources.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\System.Windows.Input.Manipulations.resources.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-pl.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsnld.xml.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_PrepidBypass-ppd.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\Bibliography\BIBFORM.XML.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\System.Xaml.resources.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\mojo_core.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Java\jre-1.8\lib\sound.properties.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Data.SapClient.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Diagnostics.Tools.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Java\jre-1.8\lib\jfr\profile.jfc.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_MAK-ppd.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Office16\ExcelFloatieXLEditTextModel.bin.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\jsoundds.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.contrast-black_scale-180.png.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-locale-l1-1-0.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-process-l1-1-0.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\Microsoft.VisualBasic.Forms.resources.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\PresentationCore.resources.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_MAK_AE-ul-phn.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\7-Zip\Lang\yo.txt.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\santuario.md.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessR_OEM_Perp-ppd.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp4-ppd.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_PrepidBypass-ul-oob.xrm-ms.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\msinfo32.exe.mui.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.ComponentModel.TypeConverter.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\System.Windows.Input.Manipulations.resources.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\meta-index.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Java\jdk-1.8\bin\jjs.exe.tmp 4b2b256a81b429c0764ab7302aa19170N.exe File created C:\Program Files\Microsoft Office\root\Client\mfc140u.dll.tmp 4b2b256a81b429c0764ab7302aa19170N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b2b256a81b429c0764ab7302aa19170N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b2b256a81b429c0764ab7302aa19170N.exe"C:\Users\Admin\AppData\Local\Temp\4b2b256a81b429c0764ab7302aa19170N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4076,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=3940 /prefetch:81⤵PID:2172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD59b9787f434e8e14790d7c0a37344be50
SHA184d3bfaa1cdf9bf364608b91d49f0c862a6e853f
SHA256666bf6012ebed2eefb49643f8fdb2ab518c48dba925c617153dacbd805dd5655
SHA512a7b23e900c63f8498bea023ebce6a4bda10c961016cbd836cb590f41ca52a24125082790da08afb9332fb85eae3c14ce664792e276a5c1e8b2f4ad9676261316
-
Filesize
166KB
MD5d86ad7042b987e176e6e63dba2ac1793
SHA15d7cc51069943b58a45feda6561bdd72b67817c4
SHA2567f85019d84e65152f8e8a626612d91f1230171ef64f732fa23138a2350652cc1
SHA51270543171e7beafadeac30b76eb6966b56bacf403dc1369e90d9d68edef1affd6fac9917694bc4aa4a84117808e24007b672db894b22d87f96dd3200020fa57dc