Analysis
-
max time kernel
120s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 17:03
Behavioral task
behavioral1
Sample
6ab3f25914eb00459927900e1f61c600N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6ab3f25914eb00459927900e1f61c600N.exe
Resource
win10v2004-20240802-en
General
-
Target
6ab3f25914eb00459927900e1f61c600N.exe
-
Size
53KB
-
MD5
6ab3f25914eb00459927900e1f61c600
-
SHA1
bd39f8eb1378b033315641ba51338c5a434beb25
-
SHA256
96380abd393b48c93eb4a66cbce116562159209c5e2b8db65a52a62895a18401
-
SHA512
dd172978014305df8d1db06b89143893cca30cef1fb817682da5ee9c51fe1d0919ff091c033bcae12d251ce73725e2aaee5becd9eb92f95beb4347e98e584626
-
SSDEEP
768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdR:CTWUnMdyGdyoIOImsKsy
Malware Config
Signatures
-
Renames multiple (4641) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/2900-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x00090000000233f3-2.dat upx behavioral2/files/0x0014000000022912-6.dat upx behavioral2/memory/2900-870-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.WebSockets.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.PowerPivot.PowerPivot.x-none.msi.16.x-none.xml.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_OEM_Perp-ul-oob.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail-ppd.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\host\fxr\7.0.16\hostfxr.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\instrument.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-ppd.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Office16\BIPLAT.DLL.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\System.Windows.Input.Manipulations.resources.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_Subscription-pl.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_KMS_ClientC2R-ppd.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_logo_large.png.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\7-Zip\Lang\si.txt.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\PresentationFramework.resources.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Java\jdk-1.8\bin\ucrtbase.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Java\jre-1.8\bin\eula.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Common Files\System\Ole DB\fr-FR\oledb32r.dll.mui.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-crt-process-l1-1-0.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Java\jre-1.8\legal\javafx\libffi.md.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Java\jre-1.8\lib\cmm\PYCC.pf.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_SubTest-pl.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.de-de.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\System.Windows.Input.Manipulations.resources.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\System.Windows.Input.Manipulations.resources.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-ul-phn.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ul-phn.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\UIAutomationTypes.resources.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_KMS_Client_AE-ul.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTest-ul-oob.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-private-l1-1-0.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-140.png.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.NameResolution.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\UIAutomationProvider.resources.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Extensions\external_extensions.json.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\fonts\LucidaBrightDemiBold.ttf.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_SubTrial-ul-oob.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\ca\msipc.dll.mui.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsnld.xml.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Text.Encodings.Web.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Common Files\microsoft shared\ink\mshwgst.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Orange Red.xml.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Trial-pl.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Office16\mip_telemetry.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\PresentationFramework.resources.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Trial2-pl.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Retail-ppd.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Grace-ppd.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\kk\msipc.dll.mui.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Java\jdk-1.8\bin\msvcp140.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fr-fr.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.WebHeaderCollection.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\UIAutomationClient.resources.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Java\jdk-1.8\jre\THIRDPARTYLICENSEREADME.txt.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_Subscription-ppd.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Windows.Controls.Ribbon.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-libraryloader-l1-1-0.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\blacklisted.certs.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\limited\US_export_policy.jar.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_MAK_AE-pl.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Grace-ppd.xrm-ms.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Diagnostics.StackTrace.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.Cryptography.Algorithms.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\Microsoft.VisualBasic.Forms.resources.dll.tmp 6ab3f25914eb00459927900e1f61c600N.exe File created C:\Program Files\Internet Explorer\de-DE\iexplore.exe.mui.tmp 6ab3f25914eb00459927900e1f61c600N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ab3f25914eb00459927900e1f61c600N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD55f17e7b2a88e8f3c746fbdb99cbaac4f
SHA1de0a10afee4f13edbe4a7e288856c54e209c000c
SHA256826566f673918d612a1c784a66469006c059355df2867097de669484ab50419f
SHA5122ab66744f7319f8c5e373eb0a77c27c3a6927d93b30603bc05c0a26491a176c7fa4f991aa81cade67b05834084ee8cad3233fbb1afbc0f4d21eb397d031e132c
-
Filesize
152KB
MD57330dedc00a085e2014cd7a73c256143
SHA10956f90b3928bb41db7d82726a0d17bf7865d5e7
SHA256ac4672e70c80e3f1b81b34a379c2eb2c1e9f9431daa99cffb29ba3d9bd395a70
SHA5125f48669d3ddf80c82d442a59080aafac8ccfa5a5a36e0b2fad2c6805f02f0238dc245da0ae6353b93f350cf30daab7f5b893c8f964ae76d579f90c6c4e1b4d92