Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 14:48

General

  • Target

    315d043b99f988ce9d9f69d7225292eb44623a97c1a029933b62ede699fa9f13.exe

  • Size

    146KB

  • MD5

    6edfb62405f50d7fb16882ca9b16ed36

  • SHA1

    73c346267e9527ca5886bf8a90b77f9ebceb58fe

  • SHA256

    315d043b99f988ce9d9f69d7225292eb44623a97c1a029933b62ede699fa9f13

  • SHA512

    b3ea04a001c846af5d93435db055986a448fc5d01e86a9292937ce085609b653d41719111d2d031c8b6694eb01d5856e86f9e1a65e8cdc43af51a8ed3d370d2f

  • SSDEEP

    3072:PqJogYkcSNm9V7DGoNK696RTpfnEsCygHQlyT:Pq2kc4m9tDHNK6UlJ9CyN

Malware Config

Signatures

  • Renames multiple (355) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\315d043b99f988ce9d9f69d7225292eb44623a97c1a029933b62ede699fa9f13.exe
    "C:\Users\Admin\AppData\Local\Temp\315d043b99f988ce9d9f69d7225292eb44623a97c1a029933b62ede699fa9f13.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\ProgramData\C0B0.tmp
      "C:\ProgramData\C0B0.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\C0B0.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1936
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x14c
    1⤵
      PID:2348

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\BBBBBBBBBBB

            Filesize

            129B

            MD5

            a5692605fa8c525d5afcc8b18f47caed

            SHA1

            3a4ec8f887c9c4163459f7412471be7cffe82cd4

            SHA256

            ccf7b9a004667ae37543051836656739445a046b5b035583aee619a089264e48

            SHA512

            1c9c73ae525a7d70bdf87950cb2ace3996bb1e40a362e45c9da2a4755499eaac1676a5861bc38e48bdb78447c5f5e33a93bf2a4a11042fadd909aa018afc5b56

          • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

            Filesize

            146KB

            MD5

            f6c51b04c984ea95049fed67bd76d3d0

            SHA1

            9f51547ec3346a50b95c52a9f720e8935b71c390

            SHA256

            e51e572c01ca846789f4d553d220fdfccc1427d7fb3e4934a94bdecceafc9dba

            SHA512

            969883680ec23159897ca1668f31a3c35a9039abd98d3bee2f7f7290e26a2872d04c14ca64abff38d943a9cfd8d7278b11e97f9d6309eb8ca3c8dd85d2ab0ac0

          • C:\raMFGAusF.README.txt

            Filesize

            597B

            MD5

            8b868d53629149c6b3a461ff64ce8cef

            SHA1

            b8a0b57cfe78c6d8468bdd5ef52411765a456e41

            SHA256

            5f8d2cdb81cac5d0b7df3bae0634042b305b4ac7ad06c728b21df0ea9628da25

            SHA512

            2fbb224b435621bc8947caf5aa4e294725f7df1c79dfaae1674086c8e92fcdb106d734680ac58e02b112613c778b582b2eaa8e6979dc1d75dc1dccab54f7c337

          • F:\$RECYCLE.BIN\S-1-5-21-3551809350-4263495960-1443967649-1000\EEEEEEEEEEE

            Filesize

            129B

            MD5

            d49f9bfb444b7ab8f151a176212c57da

            SHA1

            5a2713836168f967839e3ebbb23ce2a4257fbe35

            SHA256

            472d7b5e9daea8749cd0081b00ee3d254db29feb3e6662ab3b8f4696cd6a5bca

            SHA512

            09df119d5a5adf1a9bc799358047059692895b822761847faed15a057be79e5d8c0389713ddeeac56d1e0bdc3a725fcd4e0e329d4bd1e4c7fe1a3a2c65618a1d

          • \ProgramData\C0B0.tmp

            Filesize

            14KB

            MD5

            294e9f64cb1642dd89229fff0592856b

            SHA1

            97b148c27f3da29ba7b18d6aee8a0db9102f47c9

            SHA256

            917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

            SHA512

            b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

          • memory/2384-0-0x0000000002250000-0x0000000002290000-memory.dmp

            Filesize

            256KB

          • memory/2712-886-0x0000000002030000-0x0000000002070000-memory.dmp

            Filesize

            256KB

          • memory/2712-889-0x000000007EF20000-0x000000007EF21000-memory.dmp

            Filesize

            4KB

          • memory/2712-888-0x0000000002030000-0x0000000002070000-memory.dmp

            Filesize

            256KB

          • memory/2712-887-0x000000007EF80000-0x000000007EF81000-memory.dmp

            Filesize

            4KB

          • memory/2712-884-0x000000007EFA0000-0x000000007EFA1000-memory.dmp

            Filesize

            4KB

          • memory/2712-919-0x000000007EF60000-0x000000007EF61000-memory.dmp

            Filesize

            4KB

          • memory/2712-918-0x000000007EF40000-0x000000007EF41000-memory.dmp

            Filesize

            4KB