Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 18:17

General

  • Target

    048b3b17fccf41d474de4d109b0ad0f32dee7c4d1e222bad9007a280e117766e.exe

  • Size

    78KB

  • MD5

    6b385da34b178c12f7aad38a7f9de4a5

  • SHA1

    9e2fc965f2038f99b5e4d2259b7221a4dba7dc77

  • SHA256

    048b3b17fccf41d474de4d109b0ad0f32dee7c4d1e222bad9007a280e117766e

  • SHA512

    80efbbc21ea9fb3405e962caff173d5e4c66f04083995742b4cb4df5e37cbd3695542d16379c9a077bee1f35afa3d5c89b3be63f8c289d6ce1a8ba712f7deb71

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5WyoESyoEa:fnyiQSox5Vpa

Malware Config

Signatures

  • Renames multiple (3444) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\048b3b17fccf41d474de4d109b0ad0f32dee7c4d1e222bad9007a280e117766e.exe
    "C:\Users\Admin\AppData\Local\Temp\048b3b17fccf41d474de4d109b0ad0f32dee7c4d1e222bad9007a280e117766e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    78KB

    MD5

    7bf1636d824920224b02378969b29344

    SHA1

    e59b228a7881c90d308929f789a8c0bc0143c9b8

    SHA256

    5e8226c21bca19a8578356381264ea1945ab29aecb4cae9fce8911bd9f78b614

    SHA512

    1a171e7df9b54608b5d9ce6bbadb6a2bef751f959ff3daae2424f5fde35117ac844c76dc7a92c7f4475a68904e10fe2f6211e788f0445c5abeeee84b686ff910

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    87KB

    MD5

    213e71a08c330b0052aa82116927fb63

    SHA1

    fc68d918fcce9b59c4c837efd6a086d6a58f3a34

    SHA256

    b4c9cc4027fd9a83df7876c8277c757be29415f18c2ea75a32e2722af2fe9b97

    SHA512

    8fc3490ccddbbe619c53c4c305edfa016738f577496a344402483508813189b47b1dbd6a926e4fcb8ef6efc518283a4db9b1c9571085e301d30613d19cdc7378

  • memory/2628-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2628-566-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB