Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:19

General

  • Target

    d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe

  • Size

    81KB

  • MD5

    00c5970860bd59108bb62088f360d4ca

  • SHA1

    2096744c436fb4cba941003ed5f619004d672b90

  • SHA256

    d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc

  • SHA512

    5247a0757e1da01c5f7f290ee7db3d74aa6ea7d9941b1832e029cbccaa2f10e4ec663821f64e66ed9848badf1a714ef087eaaff3d1fad9414a4db7c27f52801e

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti3c7Fc7Np:V7Zf/FAxTWoJJ7TTQoQmoNC4Co

Malware Config

Signatures

  • Renames multiple (2845) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe
    "C:\Users\Admin\AppData\Local\Temp\d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    58f0c11658c12a18243e08c6c24c15cd

    SHA1

    5a90bb7ddab53f0a486234906b9590c502b2fd2b

    SHA256

    79fef52b983c02fee71133d4ecc1820e967f32d91225df16b2ddaaad2ba1ae24

    SHA512

    6baa4c03282fe29e72110771475f546b861dcb6a68b9e36bb6723599489fc0640b3f03660865865ac977a570946e111a7f6fb74e8142562886af1efa3ea34f5b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    90KB

    MD5

    2761f496b32d2d96f9afeba987fa81e1

    SHA1

    c76958e7eef281c7ad04777c580e52e86a02f49f

    SHA256

    0b0fe849ac4fc96ac53ecd053bd51344708fcf5c26b4b3e87ca8b64a2fb27ca2

    SHA512

    0236004775afa2b57f07f689e5170aa3487c4f69ace5e3847d6fc062a57fd92128116646629e23cab61a9913badf44aa580b92239ceae2299f5a2c996372551a

  • memory/2524-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2524-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB