Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 18:48

General

  • Target

    10b8e40e8e794d78e6459a7b30965cea9c1f36028f8585db5b9eda2321dc10dc.exe

  • Size

    49KB

  • MD5

    163cd6546e212bc3352f6d806cf9d94e

  • SHA1

    83a59d281494f3de54ce6345f00c27c6df659d0b

  • SHA256

    10b8e40e8e794d78e6459a7b30965cea9c1f36028f8585db5b9eda2321dc10dc

  • SHA512

    144711dca7373ef99accd6967cacbd84788abc8c06057280241929842dc298a5492b34b84174a5b424d0c6f418373dac13f3fc739e2535db9f17724f3fbf8730

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zx35jtj9:KQSoU

Malware Config

Signatures

  • Renames multiple (3755) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\10b8e40e8e794d78e6459a7b30965cea9c1f36028f8585db5b9eda2321dc10dc.exe
    "C:\Users\Admin\AppData\Local\Temp\10b8e40e8e794d78e6459a7b30965cea9c1f36028f8585db5b9eda2321dc10dc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    f3815abc0b48db0454e3be7753479a8d

    SHA1

    24266e731db15240547d4a5ec5da65fabc608f60

    SHA256

    3d0e46d98a88418896175932931d5cc3f397b0418d2d67fc728a2aad0d7677cc

    SHA512

    3b08cd3c4e769572e54729e1564fdf67a0209c59039151c275eb0f5ed5c3bdbfc3e5d778ac25122845540a9eb2552812d02ea613f88a3f7afd7d90e42ce5532b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    aa1f6a8aef013b2adc391ed00e3328f1

    SHA1

    4bf38d6f288c2256790a6f138469a17ea28e9032

    SHA256

    24781a18fe146df79a4f5a98dd0e5f27d50066d156c850bc5803e7fe0c9ba72d

    SHA512

    28a261e01b152b7de563a11bc5e81899dc1a08fe5430a6b8dd1f62dc70d5850b05243b6d39f9a63d872166f2a3ab94f51cfd3f4748b17e31f8934ee49aef2042

  • memory/3028-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3028-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB