Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 18:52

General

  • Target

    0da8d6a688da731d25c8a7a8ee6568b2524bf0a025f5b15587d5827b7bcf2912.exe

  • Size

    68KB

  • MD5

    5a01f8a7c49d22b8c7a7d185a84a9d1d

  • SHA1

    acff05213401f5e2eb662b128bb9ae70cdb6161f

  • SHA256

    0da8d6a688da731d25c8a7a8ee6568b2524bf0a025f5b15587d5827b7bcf2912

  • SHA512

    bda4e4ba5f4291a391d735561a7340050e92925500a9d031decb9c84d7fc976cc7e82efc9ebd7df105186b293d78fccbe1a2e38f333cf38eb2efce1298e95c16

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyl2Sm0mKRgZg0C44enYE/FXHFJV+C44enYE/FXHFJVO5oC:fny1tE42ERgZgI5orfxDZ5orfxD9

Malware Config

Signatures

  • Renames multiple (3709) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0da8d6a688da731d25c8a7a8ee6568b2524bf0a025f5b15587d5827b7bcf2912.exe
    "C:\Users\Admin\AppData\Local\Temp\0da8d6a688da731d25c8a7a8ee6568b2524bf0a025f5b15587d5827b7bcf2912.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    b4f6d9670ee4f6e24b850c857c776051

    SHA1

    c3ccfd0a937ee169ae3b0af2f28470679f292b4a

    SHA256

    aef30ee108c0866de1a393c9abcffd137c7b56ce06082a4457bec4e8d8104f59

    SHA512

    01984c3b891ed18cff46d72af84c222bb1c963f7918e61df9138a0ec398dc9068e45c84186870ade8bacb6e4a141ff43f2f78b4dbf02e07fde86be4f03fd1740

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    78KB

    MD5

    64850984aee1d217f0568f65bd413213

    SHA1

    02c7782da91fcfd6f0f9ac9df3f12e53b7c31299

    SHA256

    9ac7e2571d80ccf4fcecf46f0070f3bfc73087fa0ea416aae51fcb4df0348344

    SHA512

    1b9645cca9925cc1b3784f962d7afcd293c234577a6aef11e1a95519cd2f719d24d61ec9dfa9df4f5c37df40cade0b23c5faa6419ccbf5c7f2702acbb52f03df

  • memory/2112-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2112-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB