Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 06:17
Behavioral task
behavioral1
Sample
f03cbb95f11885ffd1254051c2dc3620N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f03cbb95f11885ffd1254051c2dc3620N.exe
Resource
win10v2004-20240802-en
General
-
Target
f03cbb95f11885ffd1254051c2dc3620N.exe
-
Size
65KB
-
MD5
f03cbb95f11885ffd1254051c2dc3620
-
SHA1
12848c346c241b79de6234d99d6e8e71b2a8c597
-
SHA256
3335340e6dd5536edd033eb5f6ef8c68f3790e751ff4fb18e5db3f173fa3eeba
-
SHA512
ea1a976d6fdcd388080bba526f2d7cf0f75b6a91db4c21e398eb94db15b5a9c08a8dd4f90294c3bdcaec96699faf0ff75c61f69173f37d53d4077502a1df7431
-
SSDEEP
768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti4c6kjkw:V7Zf/FAxTWoJJ7TTQoQ4c6kjkw
Malware Config
Signatures
-
Renames multiple (4661) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/592-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000900000002347c-2.dat upx behavioral2/files/0x0014000000022912-6.dat upx behavioral2/memory/592-906-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_OEM_Perp-ppd.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Xaml.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Java\jre-1.8\bin\jli.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription2-ul-oob.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_KMS_Client-ppd.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\System.Windows.Controls.Ribbon.resources.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\Office16\OSPP.VBS.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail2-ul-oob.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\DATATRANSFORMERWRAPPER.DLL.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSWORD.OLB.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Common Files\microsoft shared\ink\mip.exe.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Private.DataContractSerialization.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\dynalink.md.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_OEM_Perp-pl.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_Grace-ul-oob.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription5-ul-oob.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\tabskb.dll.mui.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.Cryptography.X509Certificates.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\gu.pak.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Java\jre-1.8\lib\logging.properties.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\GR8GALRY.GRA.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\Microsoft.VisualStudio.Tools.Applications.Runtime.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Common Files\microsoft shared\ink\mshwLatin.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Requests.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Resources.Reader.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\System.Xaml.resources.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\mesa3d.md.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTest-pl.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_OEM_Perp-ul-oob.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad.xml.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_OEM_Perp-ul-oob.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\7-Zip\Lang\ky.txt.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Common Files\microsoft shared\ink\Microsoft.Ink.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\WindowsBase.resources.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Retail-ul-phn.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-black_scale-100.png.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_MAK-ppd.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Threading.ThreadPool.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail3-pl.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_SubTrial-ppd.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ea-sym.xml.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Common Files\System\Ole DB\es-ES\oledb32r.dll.mui.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTrial2-ul-oob.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Java\jre-1.8\bin\j2gss.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-sysinfo-l1-1-0.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.Mail.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\System.Windows.Forms.Primitives.resources.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\System.Windows.Forms.resources.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-sysinfo-l1-1-0.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Java\jre-1.8\bin\glib-lite.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_es.properties.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\IEEE2006OfficeOnline.xsl.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-140.png.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-environment-l1-1-0.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\System.Xaml.resources.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\System.Windows.Forms.resources.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\UIAutomationTypes.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Office16\MSOARIANEXT.DLL.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.contrast-white_scale-140.png.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Trial-pl.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_MAK_AE-ul-phn.xrm-ms.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.json.tmp f03cbb95f11885ffd1254051c2dc3620N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\System.Xaml.resources.dll.tmp f03cbb95f11885ffd1254051c2dc3620N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f03cbb95f11885ffd1254051c2dc3620N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5c655b40438501d62c5df170a11f17520
SHA1e36a0445d4047f80efe210d236af8d4da49da579
SHA256e4ecea3c829c7a613f17f7a72f012545056af7d492db60b49c562d7a18672c57
SHA512408fca10f02276b88d0b2343f769200e8e55bdb986a8f6d074f4ec3e8137f42084aa8eb7b89564a7d69445be4901dfef7d7fc5099ad8c44c4701db386e55ce91
-
Filesize
164KB
MD5e7387a0eeb589d132efe655755ac3392
SHA12cd256d12bcbc0370ee0d88a7ad1de0548784cad
SHA25692871c0da668c4b6ac035a9bbf19c81fd9353aeeeacaa1d12f92b10c1db20885
SHA512fe569b7de12bf85138b29be5e523cbb4ba513460dd64662d3f7a17fb19b9ddd8687ce47b29af3228b151f1db2ca78881841c0d453554020f551cbd81cf0d693f