Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 16:22

General

  • Target

    08638a745d358b4f0be3ada3a7918c00N.exe

  • Size

    150KB

  • MD5

    08638a745d358b4f0be3ada3a7918c00

  • SHA1

    c1c9a8d7319b4d2cb194e490cd55c2d70028e921

  • SHA256

    bcb7c11f0ae9b7959641fb8b0753fb093eaea337a3cbed5e201f86c3f5754287

  • SHA512

    a437fd7ac20964b5ea74991916dc0ed0d6f8f5586b070a01f511ad4355efaf0b8ca1f6def54cbde6bc4fabb54e1d3727a53733940ddeff8b94b478d2452c7f0b

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxSL8TWn1++PJHJXA/OsIZfzc3/Q8zxK:fnyiQSo5LcQSo5LJ

Malware Config

Signatures

  • Renames multiple (2799) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\08638a745d358b4f0be3ada3a7918c00N.exe
    "C:\Users\Admin\AppData\Local\Temp\08638a745d358b4f0be3ada3a7918c00N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    151KB

    MD5

    b37a3d05c5578a6dbbd77e0ebae43403

    SHA1

    fc07070ad9d33e57f304e9716759466c871a941e

    SHA256

    b7b50e7f8bc42b13510e5b283ac60778065e3ff267c8f79cfadb9833be77bdf5

    SHA512

    746acd096104dfe3db6a3543e4d76b990f936378d595d1066aebec42472c513e57b3efc8515afdddb46f7c254752f6cb1d5b322a80b02f4ce4b6f31bb3a85bd0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    160KB

    MD5

    4bf122e2d36908ad1b14816f6b0871ea

    SHA1

    e1f1480e66dacabfa0b67e0e1d404ecbe8fef5e6

    SHA256

    8cbd10e749e8cdcf4aeaddad85e7bbbc59cb71676edcce7979453071e3db9550

    SHA512

    8aec5dbd106f736b6010a63b51c0f64d6545e4723dd4ca1bfc7832fabddfddff07df5f9d086312f2d20515dfde4e7d3e2315185b7312a438a310ffdc6262a1a2

  • memory/3012-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3012-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB