Analysis Overview
SHA256
c02f9f14ff3044ba255b9d1877dba3340d954261b08a8bf48687149a1ce6bb66
Threat Level: Likely malicious
The file c02f9f14ff3044ba255b9d1877dba3340d954261b08a8bf48687149a1ce6bb66 was found to be: Likely malicious.
Malicious Activity Summary
Renames multiple (223) files with added filename extension
Renames multiple (222) files with added filename extension
Drops file in Program Files directory
Unsigned PE
System Location Discovery: System Language Discovery
MITRE ATT&CK
Enterprise Matrix V16
Analysis: static1
Detonation Overview
Reported
2025-05-18 09:56
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2025-05-18 09:56
Reported
2025-05-18 09:59
Platform
win10v2004-20250502-en
Max time kernel
150s
Max time network
136s
Command Line
Signatures
Renames multiple (223) files with added filename extension
Drops file in Program Files directory
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\c02f9f14ff3044ba255b9d1877dba3340d954261b08a8bf48687149a1ce6bb66.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\c02f9f14ff3044ba255b9d1877dba3340d954261b08a8bf48687149a1ce6bb66.exe
"C:\Users\Admin\AppData\Local\Temp\c02f9f14ff3044ba255b9d1877dba3340d954261b08a8bf48687149a1ce6bb66.exe"
Network
| Country | Destination | Domain | Proto |
| GB | 2.18.27.82:443 | www.bing.com | tcp |
| GB | 2.18.27.82:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| GB | 142.250.178.3:80 | c.pki.goog | tcp |
Files
C:\$Recycle.Bin\S-1-5-21-3674642747-2260306818-3009887879-1000\desktop.ini.tmp
| MD5 | 76936e288c0c15c07d40fad7b659aa33 |
| SHA1 | 21b13889850862238a05b04c75b768d558efc530 |
| SHA256 | aa0f7b4a20f701666b9042c9b7f78f33635fb837c7a24a966b863891327945f5 |
| SHA512 | 9fffe9e237ca1316a09fdf9d93ecff6c15f3cf81057987403ce42a462003f64edc5f771c1d7bcbf2ecb4a247d16064498b68a2fb18e0f579a943330980d0f94e |
C:\967f022c4c136664abfad56c1fb73a\2010_x86.log.html.tmp
| MD5 | aec846fa971d15d5c247840edcc27699 |
| SHA1 | 8a730aef730767406f9d09a49eb3830211b7064e |
| SHA256 | 69d67efb54e4b239fa9291569ee92df24deb147e572b50ab24d3d7a8410a7ec2 |
| SHA512 | cd1a7a52c5c3ab7e421933cfd4e7666d37b2fb96001c957fb7fb690c46a305c138b3a5f9555487313d2af3bc4622445743560decee4c6ce75c9c08a65d469274 |
memory/5280-43-0x0000000000400000-0x0000000000407000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2025-05-18 09:56
Reported
2025-05-18 09:59
Platform
win11-20250502-en
Max time kernel
150s
Max time network
111s
Command Line
Signatures
Renames multiple (222) files with added filename extension
Drops file in Program Files directory
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\c02f9f14ff3044ba255b9d1877dba3340d954261b08a8bf48687149a1ce6bb66.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\c02f9f14ff3044ba255b9d1877dba3340d954261b08a8bf48687149a1ce6bb66.exe
"C:\Users\Admin\AppData\Local\Temp\c02f9f14ff3044ba255b9d1877dba3340d954261b08a8bf48687149a1ce6bb66.exe"
Network
| Country | Destination | Domain | Proto |
| IE | 52.111.236.23:443 | tcp |
Files
C:\$Recycle.Bin\S-1-5-21-3588213599-686740421-4058676312-1000\desktop.ini.tmp
| MD5 | 89233fb47b986b7faa8d6cf07213aa90 |
| SHA1 | 4eb9e65ba2a30137178309d5c837797bea3e7ab6 |
| SHA256 | 6c635a286d4f79c21ba06e3d99f52023d94718977835685d99fe45a9cf15f12b |
| SHA512 | 13c9ae4483027a0ef0f1dbfc8ea3a2bb9623aaa2097bca544a95c3684077f61444ceb32c64793079c3cef87c0da6f77d1d72f903d723ffc62ba49099896f5122 |
C:\ef2ee615ae93a516ddfc423cbf0f901a\2010_x86.log.html.tmp
| MD5 | 575f363ed8a134c19007ecc2a1568716 |
| SHA1 | 1a3d0acf955681386f6ca179383f1029128e1917 |
| SHA256 | 8874cd760ed3b93b2ef233e5dadc7b7304a3e86ef3407d918087ee1551d51bf9 |
| SHA512 | fc1562d8430ce8e88d699357b20d21330d10489a6f1d9abe376537a38946568eec88cf1c253ed22e7f9e2e732dbbea912cf157e1f1b853c9e634ea7662656b52 |
memory/1176-43-0x0000000000400000-0x0000000000407000-memory.dmp