Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 10:33
Behavioral task
behavioral1
Sample
68dd5191379b300a60a7d526f9c57dc0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
68dd5191379b300a60a7d526f9c57dc0N.exe
Resource
win10v2004-20240802-en
General
-
Target
68dd5191379b300a60a7d526f9c57dc0N.exe
-
Size
41KB
-
MD5
68dd5191379b300a60a7d526f9c57dc0
-
SHA1
1443628566c0eae800c8881868669f73872d5248
-
SHA256
1596a48f3a41b38b93c3a446a237506b481aef8886a3f049cb3fbe119349ae51
-
SHA512
99e4cb150383c116149781f88c6916010d6bd57deeb81aeb78c57d1e8d01245ffe81a852657a9f1994c9fd4468b7e38acbeabf7f63084d850498b2b3b0a55cdd
-
SSDEEP
768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9yiZEMry/ZEMry0:CTW7JJ7ToP4q
Malware Config
Signatures
-
Renames multiple (4676) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/4072-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x0009000000023489-2.dat upx behavioral2/files/0x000400000002291b-6.dat upx behavioral2/memory/4072-924-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-processthreads-l1-1-0.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Java\jdk-1.8\bin\jps.exe.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Retail-ul-phn.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardMSDNR_Retail-pl.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\GostTitle.XSL.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Reflection.Extensions.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_Subscription-ul-oob.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\kor-kor.xml.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Threading.Tasks.Extensions.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcR_OEM_Perp-ppd.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTrial-pl.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\MicrosoftDataStreamerforExcel.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\7-Zip\Lang\tr.txt.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Common Files\System\msadc\es-ES\msadcor.dll.mui.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Java\jdk-1.8\jmc.txt.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_PrepidBypass-ppd.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_MAK_AE-ul-phn.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\basicstylish.dotx.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Common Files\System\ado\adojavas.inc.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Internet Explorer\sqmapi.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_Subscription-ppd.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\BIPLAT.DLL.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-100.png.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\cs\System.Windows.Forms.Primitives.resources.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-processthreads-l1-1-1.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Grace-ul-oob.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_Grace-ppd.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\word2013.dotx.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\colorimaging.md.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvApi.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Java\jre-1.8\lib\management\management.properties.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail2-ppd.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription3-pl.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\eu\msipc.dll.mui.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\it-IT\mshwLatin.dll.mui.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial2-pl.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\MICROSOFT.DATA.RECOMMENDATION.COMMON.DLL.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.UnmanagedMemoryStream.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-processthreads-l1-1-0.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\verify.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-ppd.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\jsoundds.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\server\classes.jsa.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_KMS_Client-ul-oob.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.EventSource.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.UnmanagedMemoryStream.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_SubTrial-pl.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\System.Windows.Forms.Primitives.resources.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\sr.pak.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Java\jdk-1.8\bin\klist.exe.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_MAK_AE-ul-oob.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\offsymk.ttf.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\EXCELPLUGINCORE.DLL.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Java\jdk-1.8\lib\jvm.lib.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-black_scale-100.png.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-runtime-l1-1-0.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription2-pl.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_SubTest-ul-oob.xrm-ms.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.OleDbInterop.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Dynamic.Runtime.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\PresentationFramework.resources.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\PresentationUI.resources.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\tr\UIAutomationProvider.resources.dll.tmp 68dd5191379b300a60a7d526f9c57dc0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68dd5191379b300a60a7d526f9c57dc0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD53d68a93698c042410f4ecd74783ea9c0
SHA1769c5234f28995296768041fab48b5c6d4eb06bf
SHA25671f94a305877aef6575ca74ee570d41424a1dbde4efe0850dbeba5969c0d2590
SHA51229b66e119e99ff1cab5d2ff656c88a4f65834e57f78b0730ce3e9463b5de23e51fad40f290fa5fdfc242270ec3da3f8caf060400d6a40b2b6f59151851524b96
-
Filesize
140KB
MD54de8cedb835dad66c493ace16501a1c2
SHA10fb3c81ad311800dfb88b74719abbc0d7bce2ceb
SHA256b1d7beab0fa18b92e9ff856abbc7b3f8b5b4b659f7d9a90060fe95471687805d
SHA512b5a7604f38bdf66f93ef457c411d24b9e73ce26c72c291ddcb9b1725a3691672569b0489102411276b05ee9146af480f97d907514baef4ad718242443662346e