Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows11-21h2_x64 -
resource
win11-20250502-en -
resource tags
arch:x64arch:x86image:win11-20250502-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/05/2025, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe
Resource
win11-20250502-en
General
-
Target
31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe
-
Size
28KB
-
MD5
99bb589848df9617aad19c224ab538b7
-
SHA1
cc28b66727df82f2297e158012f94b8b18cdc360
-
SHA256
31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a
-
SHA512
cb025f43ed25b5209f125668dc443af56b72b6454f6d2b1dcac4947bd3c9d83ebf73e4bb7b147f149b5b64065470f69d5e53b936ccfa6e6c554eb9dca5c33fe6
-
SSDEEP
768:uZ4FLz8ae+rOn8ae+rOHPRPq+BSBmBCUK9+BSBmBCUK1:uGIIHp1MkPMkU
Malware Config
Signatures
-
Cosmu family
-
Detects Cosmu payload 1 IoCs
Cosmu is a worm written in C++.
resource yara_rule behavioral2/memory/4200-1123-0x0000000000400000-0x0000000000407000-memory.dmp family_cosmu -
Renames multiple (5343) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\System.Windows.Forms.Design.resources.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-crt-multibyte-l1-1-0.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial5-pl.xrm-ms.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL119.XML.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ExpenseReport.xltx.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\WindowsFormsIntegration.resources.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\sql70.xsl.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Intrinsics.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.Cryptography.Cng.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Java\jre-1.8\lib\ext\dnsns.jar.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_Retail-ul-phn.xrm-ms.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Office16\cpprestsdk.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Common Files\System\ado\msadrh15.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Retail-ul-oob.xrm-ms.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-locale-l1-1-0.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\Microsoft.CSharp.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Google\Chrome\Application\133.0.6943.60\PrivacySandboxAttestationsPreloaded\manifest.json.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Java\jre-1.8\lib\tzmappings.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\FileSystemMetadata.xml.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_OEM_Perp-ul-phn.xrm-ms.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\zh-CN\msipc.dll.mui.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\System.IO.FileSystem.Primitives.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\System.Net.Quic.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\WindowsFormsIntegration.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\vcruntime140.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Java\jre-1.8\bin\zip.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Grace-ppd.xrm-ms.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.Extensions.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Windows.Extensions.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Google\Chrome\Application\133.0.6943.60\Locales\sl.pak.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Java\jre-1.8\lib\logging.properties.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Java\jre-1.8\lib\sound.properties.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019VL_MAK_AE-ul-oob.xrm-ms.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ul-oob.xrm-ms.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\word2013bw.dotx.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\7-Zip\Lang\yo.txt.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.WebSockets.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\System.Windows.Forms.resources.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\UIAutomationProvider.resources.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Java\jre-1.8\bin\orbd.exe.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Retail-ul-oob.xrm-ms.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_Trial-pl.xrm-ms.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.SqlServer.Types.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcp120.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\rtscom.dll.mui.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.Cryptography.Algorithms.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.FileSystem.DriveInfo.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\System.IO.Compression.Brotli.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\System.Windows.Input.Manipulations.resources.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\ecc.md.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.Excel.Excel.x-none.msi.16.x-none.xml.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Reflection.Metadata.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\ReachFramework.resources.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.15\zh-Hant\UIAutomationClient.resources.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-3101-0000-1000-0000000FF1CE.xml.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTrial-ul-oob.xrm-ms.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_OEM_Perp-ppd.xrm-ms.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_OEM_Perp-ul-oob.xrm-ms.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_MAK_AE-pl.xrm-ms.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\Common Files\System\msadc\it-IT\msdaprsr.dll.mui.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Private.Xml.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.Cryptography.Csp.dll.tmp 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe"C:\Users\Admin\AppData\Local\Temp\31636d98b7165702e3bc2cd27ade00eddfc05edb4a7d4a5cc53c13da6ed0658a.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4200
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD512251d81d1e693fbc92ab8115e9e290e
SHA1aef3fd13f5dc9341af9e7184c14e8340e7dbf087
SHA2568c2267ae648723d197f32d105af98248ec9fa59129ba1cae5b89c6a922581a04
SHA51210989eaea6278225c9cd476e6ec71d5d2068df8c14d0a6360d7723150a15f5a6de4d823432b4bcd0dee3b96940754efc7c4840fc6d7432226828b8cb5bb155ff
-
Filesize
109KB
MD5a042904fecfc0b0f19be26bd6981e0aa
SHA18d8c52209581be6d1cf610aaacaf582da59e924d
SHA25686ecfe81226e4a57f877c2d34476492a8d385ae694c98144eeb8e4f4ea10e02e
SHA512eb8784ab6ae98c6487b5771d3c7210a04eafc67ce0e10d1ccb688099c0ae39aa71fa25fbb6be9d3eddb035400cae4c7f0571dc4b7cae2da02f61bd517c091a64