Analysis
-
max time kernel
120s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:19
Behavioral task
behavioral1
Sample
d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe
Resource
win10v2004-20241007-en
General
-
Target
d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe
-
Size
81KB
-
MD5
00c5970860bd59108bb62088f360d4ca
-
SHA1
2096744c436fb4cba941003ed5f619004d672b90
-
SHA256
d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc
-
SHA512
5247a0757e1da01c5f7f290ee7db3d74aa6ea7d9941b1832e029cbccaa2f10e4ec663821f64e66ed9848badf1a714ef087eaaff3d1fad9414a4db7c27f52801e
-
SSDEEP
768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti3c7Fc7Np:V7Zf/FAxTWoJJ7TTQoQmoNC4Co
Malware Config
Signatures
-
Renames multiple (4310) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/2440-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000c000000023ba4-2.dat upx behavioral2/files/0x00140000000228fc-6.dat upx behavioral2/memory/2440-664-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\xalan.md.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Java\jre-1.8\lib\ext\jfxrt.jar.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WordNaiveBayesCommandRanker.txt.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\System.Windows.Forms.Primitives.resources.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial3-pl.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Trial-pl.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_OEM_Perp-ul-phn.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_Grace-ppd.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail2-ppd.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-filesystem-l1-1-0.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\jfxrt.jar.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\CT_ROOTS.XML.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WWINTL.DLL.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_Grace-ppd.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\7-Zip\Lang\gu.txt.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\7-Zip\Lang\sv.txt.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.vi-vn.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.WebSockets.Client.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\System.Windows.Forms.resources.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\UIAutomationClient.resources.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\ta.pak.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial2-pl.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Cryptography.Primitives.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Java\jre-1.8\bin\jjs.exe.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Trial-ppd.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Grace-ppd.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProDemoR_BypassTrial180-ul-oob.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\ReachFramework.resources.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest3-ul-oob.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\bwcapitalized.dotx.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Threading.Timer.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\System.Windows.Forms.Primitives.resources.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationFramework.Aero2.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\es-419.pak.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_Subscription-ppd.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\ecc.md.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Retail-ppd.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_PrepidBypass-ul-oob.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Trial-ul-oob.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Reflection.Emit.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProMSDNR_Retail-pl.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.OAuth.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\tabskb.dll.mui.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\UIAutomationClient.resources.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\sunmscapi.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalPipcR_OEM_Perp-ppd.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\UIAutomationClient.resources.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-heap-l1-1-0.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\tzmappings.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial2-ppd.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\GR8GALRY.GRA.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.Serialization.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\Microsoft.VisualBasic.Forms.resources.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\jpeg.md.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial1-pl.xrm-ms.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\MSOUC_F_COL.HXK.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\host\fxr\6.0.27\hostfxr.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Resources.Writer.dll.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\libxslt.md.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe File created C:\Program Files\Java\jre-1.8\bin\keytool.exe.tmp d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe"C:\Users\Admin\AppData\Local\Temp\d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD557cb3fb4ef95b3540a993792c97f522e
SHA1a5827c6a98c10ff468ab6af78618fc7706dd9226
SHA25662d52446d8ac1be7e1c566961b4cd713c66babd7c987089a3845a1ce18b77b6c
SHA51222349300c3fa358fda606b73e26d4993b3fd01f599e5dd64eaac26250defd4c5559050c4ffa2a09abbd06c7a4194b9ad468d5cc64f19644712c717d640af876b
-
Filesize
180KB
MD5582e23f5fe8100d2a0577bf5bf522bbb
SHA19d9d742eb4c45a73ef63db03341847bc6c9a276a
SHA25693d83564840f898ba55b6ff922d16550adde120310cc4417d511b46effa36181
SHA512645ce3edbdc08d4d4cca6367b83b8500da372aacff814b01d60f922ad56de20d09b9cb3657a913696a2ad2f46e9845634663f01caca281da4b307969dbc1d923