Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 18:44

General

  • Target

    0b2301e23d9be99f24a278edd98931c00a4e55fdb5b3f27324b36fcf58495194.exe

  • Size

    45KB

  • MD5

    3d8dd6e6292dab682c54d1482a0a7271

  • SHA1

    7f759f87460067253db11189aa37b90c95cfeed1

  • SHA256

    0b2301e23d9be99f24a278edd98931c00a4e55fdb5b3f27324b36fcf58495194

  • SHA512

    5c8abad1661cb97369b75fc791d31369b6efc1d28eaa680125a7ab006c5fecf6fe37086e8097bf8a81664be9e2687237c67db036c6e5bea7d5a7ec6d171554b6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9cw:V7Zf/FAxTWoJJ7TCw

Malware Config

Signatures

  • Renames multiple (3872) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b2301e23d9be99f24a278edd98931c00a4e55fdb5b3f27324b36fcf58495194.exe
    "C:\Users\Admin\AppData\Local\Temp\0b2301e23d9be99f24a278edd98931c00a4e55fdb5b3f27324b36fcf58495194.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    ea0a5216dee7fc576e454f24cfdf65e9

    SHA1

    bd8282e730d4232d32ae96f96573dae77ef87be8

    SHA256

    bda1bad1ab4fb486cd0ffb215dc91ac48a2fe5b442e4b46d2d1785afe6f078a3

    SHA512

    b068cac0dd8f1b7c643bcdce592d66789e8269976b7569d798822f4adb82c3d400c06199eebffc6050094aae5dfe14eabb1b7d8ce5ef82ec30f6c0ea4cba843a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    47412a58f5e433a45b6f59253c34dc7c

    SHA1

    d2663bd6ce6a0d4b939ebbaa4a41dee608510c38

    SHA256

    dd4b34d6545bf9c15909f646f4e88ee51f6432f316e36603372d492d9ca2dac6

    SHA512

    4afc3f453f6effa74854a1731c1343c5f34710ef62be120cb06351155953ebe56008761a589152d9cf3bacddaf73d9546ba87f37725380ab84956676f1213c3e

  • memory/2692-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2692-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB