Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 18:21

General

  • Target

    0b8cda682b56ac2b0f9366ce4fd24129baa90a49568652d6871a3283d60dbf15.exe

  • Size

    54KB

  • MD5

    9ca7aa1cd3879d4b87fb52ecffec0b71

  • SHA1

    fd6b5347d977a1597f144275fd2b6c72d6df78d4

  • SHA256

    0b8cda682b56ac2b0f9366ce4fd24129baa90a49568652d6871a3283d60dbf15

  • SHA512

    c5a52fefd43df0f8228e7673a00cacfc124bd5c4658801618dfe21eb3c011464999ce29ac799493799716fed5a3830a5058fde50f9119d4770fba6a7b77458b0

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TfUWWUbUgUgUhUWUbUgUgUhUWrCgmD:fny1jUWWgLLUhUWgLLUhUWRm

Malware Config

Signatures

  • Renames multiple (3739) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b8cda682b56ac2b0f9366ce4fd24129baa90a49568652d6871a3283d60dbf15.exe
    "C:\Users\Admin\AppData\Local\Temp\0b8cda682b56ac2b0f9366ce4fd24129baa90a49568652d6871a3283d60dbf15.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    236dc97051642c5a134d51a6b7937639

    SHA1

    e6d276bf908c8559efe8a3af7fb459b44bb56937

    SHA256

    9c876a82783140a4562de6b89545d1696a717aaf6de81d20767c110df553f949

    SHA512

    7c3dc6f73dcf17aafceece5782f4fc22bc787e0c3a25f592086fc294dda46bd78635534f663fe8d4137b100ac936b002ae66a04a124e9b3ee5d036ab62179ae4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    5fe8250290f6952907608b2f4d5c7a32

    SHA1

    2159a063d4247f9a53500b8318cefdcff3ebb74f

    SHA256

    0ecfead3c344b161280befdf0928623004b08be67f62ca95ca705e0f174370dd

    SHA512

    e9a6bb8b023d978e2bcf69f9a97ae2aec65c3b7eb5f49d97acfd842515dd552838c5a35f087b2f8fade4e456e89b5a74242d5d8041f73216accb64744530c506

  • memory/1672-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1672-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB