Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 00:01

General

  • Target

    0aa0d07800ee4306b1647da5f2c72640N.exe

  • Size

    80KB

  • MD5

    0aa0d07800ee4306b1647da5f2c72640

  • SHA1

    80eabfe6b4f52b97318be9f72af53e65a2de65a6

  • SHA256

    78a3728acaee97ea503f9ecaf77b49c077c6f8a6a64c5b8f38e32e6230bdb07e

  • SHA512

    b873db5d41aa87a285b8c718e2e9d5b53bd486283583c7837dcfdf9b5e9b8007068ef9b27f1fff0ead033ab709c01230267b8733937042be1c73bbc9c677cb0c

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZR9TZi9TZ2:fnyiQSo7ZTZcZ2

Malware Config

Signatures

  • Renames multiple (3125) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0aa0d07800ee4306b1647da5f2c72640N.exe
    "C:\Users\Admin\AppData\Local\Temp\0aa0d07800ee4306b1647da5f2c72640N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    af86efdbd0150f6e35d49dd3d4e9ff4d

    SHA1

    821f47d9cb7f0bd0b7070fba25acb53eb71440aa

    SHA256

    e3cefc98e7ee7bd9891a33e4de6f673e74c5dc3e15e5d7cdf470997fe6781bf4

    SHA512

    e3cd39cbfc473a0877437a7d7acb2bbf73e19d8d1f51f2d9f3420aa71986817efa5ce06bf8633b0fef341541ac78e17ec78be45653db171fe61dda497da73dfd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    3c7e395d35afd924bd8de9047f9635de

    SHA1

    08c9fbbd0607f65bc0d285a28a84529fe4acd772

    SHA256

    9d87d69cf790a81377279fe2466974e018f7410c27fbc8587b890cfe0991b1f3

    SHA512

    035137ee61bcc823fb1effdc1cf97158840f5ffd2cbe24d3e137833408ea63e7bfb408b9b602740f16edfa280e2affd0ba005c27c3dd4f67c04596d829b008dc

  • memory/2764-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2764-654-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB