Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2024 01:02

General

  • Target

    08bd364f006ecda3b0760d7cbf107a23073529c5e863d6b1521a0612163d0a61.exe

  • Size

    136KB

  • MD5

    a5c0af52fdb53b6e451736bc3287503d

  • SHA1

    63bc7dce786d3c83783749c700bfda7871f91f1c

  • SHA256

    08bd364f006ecda3b0760d7cbf107a23073529c5e863d6b1521a0612163d0a61

  • SHA512

    390fe917b400a472c880c1cefa4ce6f9ed7cda77395365336d6ff4d76827e13eaa1a4ca8a653f73d442cde8c2b51fa17f9c5e566f3f0468abc66604ea21fc723

  • SSDEEP

    3072:x91uZu1iQl0Mep53PKuc7FsTYJ0Fwcl8mcjbuD:x3iMepVPv6mEZfjbU

Malware Config

Signatures

  • Renames multiple (5240) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 8 IoCs
  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08bd364f006ecda3b0760d7cbf107a23073529c5e863d6b1521a0612163d0a61.exe
    "C:\Users\Admin\AppData\Local\Temp\08bd364f006ecda3b0760d7cbf107a23073529c5e863d6b1521a0612163d0a61.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Users\Admin\AppData\Local\Temp\08bd364f006ecda3b0760d7cbf107a23073529c5e863d6b1521a0612163d0a61.exe
      "C:\Users\Admin\AppData\Local\Temp\08bd364f006ecda3b0760d7cbf107a23073529c5e863d6b1521a0612163d0a61.exe" --food
      2⤵
      • Drops file in Drivers directory
      • Drops startup file
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\tipresx.dll.mui.sola

    Filesize

    3KB

    MD5

    2cc452a0c0ce7dd0d124f60a28bb9bfd

    SHA1

    7f6e41eb1e8a5306ec7a3d2c7f004e2b38f06136

    SHA256

    4ad66435bb65342bf75e4dee8f3373165342e6abd20b4174a772e633206ed2a6

    SHA512

    62ce2bf6843c94b5e940c8aa891312f33b95e9a6fb10f9973df25d8c0958346fb435878084db855f9405bc0bcaee8cf2f190638f624bd47802dcd35f3067cd19

  • C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\tabskb.dll.mui.sola

    Filesize

    3KB

    MD5

    6865c75e97ff2216e46a03805ebf6cdc

    SHA1

    d32fa8ff9fdc985f64b7b16b37d5766bb39e1576

    SHA256

    541ad5d4251cdd80e02472ffc7059fd56cd762a06cb585a760f459bb0b3b87b5

    SHA512

    7d8e9dfeb3a46edffa60b8c414d785528ef3ac52688497cbe34de2f426fd318f1a6c76dc153ce4f794b23de483df2524814b80d4ae822d3a579e4bb38a955cf1

  • C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\mshwLatin.dll.mui.sola

    Filesize

    2KB

    MD5

    b61bab661ba507117ac70c09dd3a5627

    SHA1

    0827cf6b5fab2f49cbf03d110593d50039cb4cdc

    SHA256

    ade3afa38bbfaef63c070012ea33494bd8b3fe20ad425fc15ba395e748a95d2a

    SHA512

    cb046ebe756c3fb92e05229ba0f726e0c9f6f9bc0f58b94ca02648fff52331e6f91dc198f08494fdbe0dc807bd75910fa41a655b6dff81beefadd1ae662d2492

  • C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_zh_CN.jar.sola

    Filesize

    10KB

    MD5

    3be9abad9785e2a64d82af409aa6952b

    SHA1

    8866d077ac3ea38ad3b1c331bb1251b0ace3d837

    SHA256

    292aefeec32e209c9be9d2c65cad83021d13b950c84de66c44574c7c1867916d

    SHA512

    2b68d1a77d7604444cfe83ff763773042aa4c720f863dd350b8201446e4255a896590b379c718b6e5c54cb07a76bd3fbacfcd68b7c18cf1ef138896932368f98

  • C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-sa.jar.sola

    Filesize

    33KB

    MD5

    0879e3f9a34a7e503221a37c0b206060

    SHA1

    6da894a22ed0776324239fe5d82d7c2c34591625

    SHA256

    f4890a807f981591ed75e3b65487637c9193126bb19f988365917dae1d72227d

    SHA512

    27b43954917d0035f672993a8a0ff6704b7893589bf9919dd07a7307cad5d50673d5cfb6f9b8773ba45b79803076ae633cce65b42f4d757002122c5995b9561b

  • C:\Program Files\Java\jre7\bin\dtplugin\npdeployJava1.dll.sola

    Filesize

    1.1MB

    MD5

    5e678b2056a16a12cde8123264313ac7

    SHA1

    95aedcbebdfd18f37336e7ecef9ddd269744ea4b

    SHA256

    cc48056186652b27fc03cf9f3105b61cc2968aa222d1f830134723320521610b

    SHA512

    633dfe3c958d03442321b417ae9045aaee27924ac036417f24a1cb05fcf818eb4b1da36d38cfde760a4dea7c25a3edc76f90219a659a6c1b3a2e47fefd5dc1e7

  • C:\Users\Admin\Music\README.txt

    Filesize

    19B

    MD5

    cd0005971dd81c61d5be812f33a2b35e

    SHA1

    01f1ad380bb99d1a80e4fc1800c1b4e5f72e19d9

    SHA256

    e6d506e4376528c4ac030840c4c49d3501b85d1fdd6f367b4c8100c444d528af

    SHA512

    8b6d984ea0c15851f22fd8ea5f8c7925b2d2caacdd81dc5ed301d71feffb08b71dd95d16dee83c2a945e263e3e7b15e6706e2df691c4462f81aa3bae1821ebad

  • C:\Users\Admin\Pictures\BlockSubmit.svgz.sola

    Filesize

    241KB

    MD5

    6ae66200c765b3d4c3cd43013b90665c

    SHA1

    b58c0e740d448f0e0ba914cc946d94d9e72b24ff

    SHA256

    ee90fe5294abaa05de6b58da0e213dbc119d30362074d360dc3445dd94ef0fb1

    SHA512

    b73551713d7efafccaeadcdfc517a82d358a8f7bb623cfd0f7e7ec9b355e49633b2741800c26995d0fa5fbf23d722ef4331aec35156ce818787a24f5f7534521