Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 12:32
Behavioral task
behavioral1
Sample
dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe
Resource
win10v2004-20240802-en
General
-
Target
dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe
-
Size
78KB
-
MD5
784d2e84187680cfc31e8b3517bad916
-
SHA1
43edfb6a02bac8880bd01aa035c5eba66c47ff9f
-
SHA256
dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a
-
SHA512
ebc14ab8714ba6449775d00bf1114710b6005047a1a4683788ce6dd763921690ebf537f5831d7931a68f531c7268b5018e88a2ce2c9a98ce2e217ff09e8db982
-
SSDEEP
768:a7BlpyqaFAK65euBT37CPKKDm7EJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKvhWS5:a7ZyqaFAxTWbJJZENTNyoKIKMSwSx
Malware Config
Signatures
-
Renames multiple (4871) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/3400-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x00090000000233e3-2.dat upx behavioral2/files/0x00040000000228de-6.dat upx behavioral2/memory/3400-862-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.XPath.XDocument.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Diagnostics.EventLog.Messages.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\nashorn.jar.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientOSub2019_eula.txt.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\7-Zip\Lang\mk.txt.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\PresentationFramework.resources.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest4-ul-oob.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019DemoR_BypassTrial180-ul-oob.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Trial-ul-oob.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Common Files\System\ado\msador15.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\linessimple.dotx.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\ISO690Nmerical.XSL.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\MSHY7EN.LEX.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\7-Zip\Lang\et.txt.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msadcer.dll.mui.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.CSharp.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.Windows.Controls.Ribbon.resources.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessRuntime2019R_PrepidBypass-ul-oob.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessDemoR_BypassTrial365-ppd.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_KMS_Client-ppd.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_Subscription-pl.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Common Files\microsoft shared\ink\da-DK\tipresx.dll.mui.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.scale-140.png.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\MSVCP140_APP.DLL.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\MEDIA\CASHREG.WAV.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\concrt140.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-140.png.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\msvcp140.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_CopyNoDrop32x32.gif.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifestLoc.16.en-us.xml.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdXC2RVL_KMS_ClientC2R-ul-oob.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\msth8FR.LEX.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\System.Windows.Forms.Primitives.resources.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-black_scale-140.png.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\MSGR8EN.LEX.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\nio.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pl\WindowsBase.resources.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_MAK-ul-oob.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Trial-ppd.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WacLangPack2019Eula.txt.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\ExcelTellMeOnnxModel.bin.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\ODBCMESSAGES.XML.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\WindowsFormsIntegration.resources.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\cs\System.Windows.Controls.Ribbon.resources.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\sk.pak.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Client\msvcr120.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp3-ul-phn.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Retail-ppd.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\7-Zip\Lang\sr-spl.txt.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Java\jre-1.8\bin\javacpl.exe.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Java\jre-1.8\bin\rmid.exe.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-ppd.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\ONENOTEM.EXE.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\tzmappings.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019DemoR_BypassTrial180-ul-oob.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_MAK_AE-pl.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Office16\MEDIA\TYPE.WAV.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\UIAutomationTypes.resources.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Drawing.Primitives.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Windows.Forms.Primitives.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\123.0.6312.123.manifest.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Client\api-ms-win-core-localization-l1-2-0.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTest-ul-oob.xrm-ms.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.ComponentModel.TypeConverter.dll.tmp dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe"C:\Users\Admin\AppData\Local\Temp\dc639202ae798963d0c4cf99f272c7a90de0ed706d22381484dd0fe97b23882a.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5d566db6ae4da16567960c1af5bfee57a
SHA1219e1c318ca68441e0a976a4f0359adb45e01f93
SHA2567c41e1f78a350052142610e8f3862a27621d104f24c632260fb57916853b6b7e
SHA5128341403307a47a1f28d4cc91d3eb3b291aa9ed2b19603efcb799d235ae0ff614266abe1e312d015407619a01bd46149c3ea4775b7302a1d67ba185ef94661167
-
Filesize
177KB
MD51b66b59b7311aa16cb2fa027d69ae3af
SHA18861a77538c877b3602307820cd5bb3702adfcea
SHA2568b719e43cb056faba77c408e043491d934d0d3a9896f3291715d4597ffdb6399
SHA512b04e04c700808df2593d025b96d97c5d956f716664629856afe02cff1393d0dc92c75b02613f5e52cd183559f89f73186bfa9cf07fa7c30e1a2ba0b9259a87f3