Analysis
-
max time kernel
120s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 11:30
Behavioral task
behavioral1
Sample
c06fa66d78772575e2deea6d48505850N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c06fa66d78772575e2deea6d48505850N.exe
Resource
win10v2004-20240802-en
General
-
Target
c06fa66d78772575e2deea6d48505850N.exe
-
Size
144KB
-
MD5
c06fa66d78772575e2deea6d48505850
-
SHA1
156622fe1b42d4da1250e156b8e0a45bf59bb987
-
SHA256
851b5af4dc8af34971a33c4a4c6df53cb9fad60e91977e542fbb1978473b704f
-
SHA512
bf1f353cbf9663375ef032c079958b4a5302a464afedb4a065b099ee0f8ccaeafb1ea8917ca9ba0347ee4be2ccd554bf3bf54170723c78539a41f49f2bd24490
-
SSDEEP
1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5dN74uTWn1++PJHJXA/OsIZfzc3/z:fnyiQSox5/QSox5Y
Malware Config
Signatures
-
Renames multiple (4280) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/1856-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x00080000000233c9-2.dat upx behavioral2/files/0x0014000000022936-6.dat upx behavioral2/memory/1856-794-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk-1.8\jre\lib\jfr\default.jfc.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RIntLoc.en-us.16.msi.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\tracedefinition130.xml.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\InkObj.dll.mui.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\tr\WindowsFormsIntegration.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdCO365R_SubTest-ul-oob.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_Subscription-pl.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\hprof.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\Office16\SLERROR.XML.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_MAKC2R-ul-oob.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\UIAutomationTypes.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\ReachFramework.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteFreeR_Bypass-ppd.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Retail-ul-phn.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTrial-pl.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\UIAutomationClient.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\UIAutomationTypes.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordR_Trial-ul-oob.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\MsoAriaCApiWrapper.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\as80.xsl.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\blacklist.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusVL_KMS_Client-ul.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Trial-ul-oob.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-pl.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.FileSystem.DriveInfo.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Java\jre-1.8\lib\cmm\PYCC.pf.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.XPath.XDocument.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\System.Windows.Forms.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_PrepidBypass-ul-oob.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_OEM_Perp-ul-oob.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.he-il.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Xml.ReaderWriter.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\System.Windows.Forms.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_200_percent.pak.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Grace-ul-oob.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Trial-ul-oob.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_Retail-ppd.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\TipTsf.dll.mui.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Common Files\System\Ole DB\oledb32.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Threading.Channels.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\WindowsFormsIntegration.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\zip.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_es.properties.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Java\jre-1.8\lib\security\trusted.libraries.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_MAK_AE-ul-phn.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\7-Zip\Lang\is.txt.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.ComponentModel.Primitives.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_Retail-pl.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Document.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\UIAutomationClientSideProviders.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrlatinlm.dat.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\UIAutomationClient.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\msinfo32.exe.mui.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\UIAutomationProvider.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\System.Windows.Controls.Ribbon.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\7-Zip\Lang\lij.txt.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\7-Zip\Lang\sa.txt.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\7-Zip\Lang\es.txt.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\System.Windows.Forms.Design.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\System.Windows.Forms.Design.resources.dll.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\dnsns.jar.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\libxslt.md.tmp c06fa66d78772575e2deea6d48505850N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_KMS_Client_AE-ul.xrm-ms.tmp c06fa66d78772575e2deea6d48505850N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c06fa66d78772575e2deea6d48505850N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD596108cf3f641d475fd4bb0940a330c7d
SHA193648dc1d4adfe6037d1959cf6882309c7a3c46d
SHA2566aba809ae2836f0370e530f20f1d55b2df8f4108b83fe05f031a1eb02c6e38c1
SHA512562895aab92c47cca949c145456471b1c9eb8d171b919b87bd321e8590cf9cbf48ce2a63efc0bb37cd65c27bf0ad8d2d793fe7404f7795e52a3342dd3a0ebbc7
-
Filesize
243KB
MD5aa0598a12c70847d5c6504bc508ad267
SHA13c51d4d3ec54a52f70791b6de62716a6bab07404
SHA2560ff56736d0ac319655d35b4e42114934a1c0d4d76f05a1976aaf4793e110eb01
SHA512597188997be31183aa8d9b8aafdb0e0b4bd18a98133731671c0ab39973581b5e3b470d02d0b982f08e6b96175563620756a61f5a66c11859a77bf323827e68d0