Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 17:25

General

  • Target

    0319ebcde2f96c8ed55c9ab3919c1f032d9c6a8d55df84a2ada61d99f103b4ebN.exe

  • Size

    102KB

  • MD5

    53511842d8bb820f2bf7d37d34bdffa0

  • SHA1

    8827ed1ded14ae163ba77f858c69b042697e2022

  • SHA256

    0319ebcde2f96c8ed55c9ab3919c1f032d9c6a8d55df84a2ada61d99f103b4eb

  • SHA512

    ed55b84ad5295fb5c4da3791f257ec34d2c5a430c6c8496684ac4518538adc660cb11e8194121d83fa007f531f5acbb989e389784d4cb342bd17ac589537b0c7

  • SSDEEP

    3072:fnyiQSodYeHNmkDxfIyKoIWbsHfySkT5GeCyi348oWGRPOzkjId6q8UdrSD+kCoO:KiQSodYeHNmN

Malware Config

Signatures

  • Renames multiple (3552) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0319ebcde2f96c8ed55c9ab3919c1f032d9c6a8d55df84a2ada61d99f103b4ebN.exe
    "C:\Users\Admin\AppData\Local\Temp\0319ebcde2f96c8ed55c9ab3919c1f032d9c6a8d55df84a2ada61d99f103b4ebN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    103KB

    MD5

    cb68ac56d6eb9ae9bcaac627bea1f190

    SHA1

    832db1ea2daefa74c79e8e23444eda2c25e98776

    SHA256

    f0474f671b1b6e103768edc0798e9105d718c7f626f401b2c6de593ba4762067

    SHA512

    4bbaf2dbccd62cb73bf5885d70a39fae0fb456384a75b9bcd6ee77ef7c85c158a91ce0b0b02ea3db8089dfcf1d0d247c16ace785553f822e7d32e7391e5f4f0c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    112KB

    MD5

    13e6518970c70ba5c961f90bca5dabc6

    SHA1

    9034debdf48b8be1758509c1acf09055627542da

    SHA256

    89fb54df86f4be73915280e27fe5730c20f63e755fa9df462397701cabdc1f9b

    SHA512

    73210e02a33be359de5d07aafcceb0944f3c5f6470ddb042e568a7e31b721a40f05cb62860c1b7d833f91862f2c54db67093c9acac06b02ee5cd891357f2d22b

  • memory/1032-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1032-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB