Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2024 21:21

General

  • Target

    0d0ad11fb502657e2f897224a9dc7aa0N.exe

  • Size

    57KB

  • MD5

    0d0ad11fb502657e2f897224a9dc7aa0

  • SHA1

    a01a86c96a1a4c4deeafb6385a893207fcf4483f

  • SHA256

    5312e5596fcc1c1c168f4496f0c98879f812c52816fadb93672050fa60e10597

  • SHA512

    27f9cc7ece05ad129f3461eb0cc0d2e2e5ebf777d2382477697b6b131faee5410f69034850bd10c24ffc5b43df309a3877476a35819c8be5386fdcdea49d0920

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zx0Cq/8S/8s:KQSop8i8s

Malware Config

Signatures

  • Renames multiple (2931) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d0ad11fb502657e2f897224a9dc7aa0N.exe
    "C:\Users\Admin\AppData\Local\Temp\0d0ad11fb502657e2f897224a9dc7aa0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    32eaa218a31ae512c00cb8740fd17bd4

    SHA1

    d4274883f9731f26a3bbb7a3e4702635e2014fec

    SHA256

    0ddef4c9796c61d2696c58fd2a324f42d95a479742fe0d6d882231d9dc6e5d58

    SHA512

    19ca65f501eab18e4512b6ca2e5aee0c04e7ac335df1dca802ab9046c6cf18dd934342dbff5b566157880253e8c84eac6d835bc61d7da42e7e446546e944c4a2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    67KB

    MD5

    f231a5524d313e48e269fa00f3888653

    SHA1

    09359f4086c469a5972ab7d6682290bdc2e984b6

    SHA256

    0d4b45a9f0813d5480c1ff83875decc83d315bbf06327a0f1e0297c329e3be17

    SHA512

    eb78e251e5ab468a2e295a879f09c96a0105cffef8fd09e6267ac0b860b5bda9255a4140439be5279b4d4c1c5b9bc68bac6a9a38d385b13d525103931206a373

  • memory/2212-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2212-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB