Analysis
-
max time kernel
119s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 19:48
Behavioral task
behavioral1
Sample
408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe
Resource
win10v2004-20240802-en
General
-
Target
408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe
-
Size
40KB
-
MD5
888c30056a580894075333fbdc4f1f10
-
SHA1
f2aa50e0d7219fd7a57a4155231eb9eadb086807
-
SHA256
408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0
-
SHA512
f5548837d27d5208f93c06a5ef421c55f4c6444bce82be6628be9db143a96cebd61f85d0cf758bd33e17aef696f17af1f038d0306fcfdda5ff2b95d3968c2f2e
-
SSDEEP
768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9Hx3R9pi1xOR9pi1xy:CTW7JJ7Th9ko9k2
Malware Config
Signatures
-
Renames multiple (4658) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/4440-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x00090000000233e3-2.dat upx behavioral2/files/0x0014000000022912-6.dat upx behavioral2/memory/4440-944-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sk-sk.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\TipRes.dll.mui.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Threading.Tasks.Parallel.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Internet Explorer\fr-FR\ieinstal.exe.mui.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jdk-1.8\javafx-src.zip.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.office32ww.msi.16.x-none.xml.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jre-1.8\bin\dt_socket.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription1-ppd.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\sv-SE\tipresx.dll.mui.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\WindowsBase.resources.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\System.Windows.Input.Manipulations.resources.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-processthreads-l1-1-1.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\server\Xusage.txt.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial5-ul-oob.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Common Files\System\msadc\msadcor.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Grace-ul-oob.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdXC2RVL_MAKC2R-ul-oob.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\pt-BR\tipresx.dll.mui.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalPipcR_Grace-ppd.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_OEM_Perp-ppd.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\lv-LV\tipresx.dll.mui.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Client\C2R32.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Collections.Concurrent.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\System.Windows.Forms.Primitives.resources.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Trial2-ppd.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\MSOUC.HXS.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\System.Windows.Controls.Ribbon.resources.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\Microsoft.WindowsDesktop.App.deps.json.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\System.Windows.Forms.resources.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_OEM_Perp-ul-oob.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail2-pl.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusMSDNR_Retail-ppd.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-white_scale-100.png.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\7-Zip\Lang\ga.txt.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Linq.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\PresentationFramework.resources.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\javafx\jpeg_fx.md.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jre-1.8\lib\security\cacerts.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O16ConsumerPerp_Bypass30-ppd.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Diagnostics.EventLog.Messages.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\sw.pak.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\xalan.md.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\cldr.md.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_OEM_Perp-ul-phn.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\fontmanager.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_MoveDrop32x32.gif.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\PresentationFramework-SystemData.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\[email protected] 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Office16\Configuration\card_terms_dict.txt.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-MX\tipresx.dll.mui.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\pkcs11cryptotoken.md.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Retail-ul-phn.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_OEM_Perp-ul-phn.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msaddsr.dll.mui.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Buffers.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jre-1.8\bin\java-rmi.exe.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-multibyte-l1-1-0.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\giflib.md.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_Subscription-ppd.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.scale-180.png.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\clrjit.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\System.Windows.Forms.Primitives.resources.dll.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ppd.xrm-ms.tmp 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe"C:\Users\Admin\AppData\Local\Temp\408d72d193996c83e543b7243c0579d562a1e42ebfbfeb683c2348265d9b7de0N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD54198cefb79f64321d0ceaded860d198e
SHA1935df28494dea4e2fffe444e82d1dd66564ebaa7
SHA25669d83493e1d99eab758a70e6506f3eb8d54b3d9db6e135927dc24b1bc0046934
SHA5123b1a4c58f802c93dcb1e20f8ddcc4fa6a33021599f4dfd139796350915900c2ce65b4866e626a1c696e57694730af7430553ef185f086e69dd8f57a665b48271
-
Filesize
139KB
MD51b54db2a98821d87bcb66549a9bf0766
SHA1b93feea5d82fdf903612016ea4512aeeb87047cb
SHA2564eb7d7f8fed959180599a46af7618a84392bacf086b3b597787e18f5e7b29b33
SHA5127c11c731ac44b4dbf1fad94520666388911e106691b3f88387d82a54228844ffbda7da421eec92a026e46263c0ad29983088c9bb427206f6e25f798eee4b9151