Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 20:29

General

  • Target

    3895820d3c42f8c10cddb5a4c42dd75e6143bc4f79ce1724859c41e4b9e19975.exe

  • Size

    27KB

  • MD5

    5263d6abc4d8b79d078c42c86f081bc4

  • SHA1

    d083c971ddbe6edaf47138823cbef7dedc574d63

  • SHA256

    3895820d3c42f8c10cddb5a4c42dd75e6143bc4f79ce1724859c41e4b9e19975

  • SHA512

    8be4c7237071f32751a615050e488a6a6ab89fc3a309c6b86f31d1bbf64073829cd48030b222fdb7f2fb957ac57cc99daf8784e6196b7a20db70124f75b3c4ad

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeu:CTWo

Malware Config

Signatures

  • Renames multiple (3432) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3895820d3c42f8c10cddb5a4c42dd75e6143bc4f79ce1724859c41e4b9e19975.exe
    "C:\Users\Admin\AppData\Local\Temp\3895820d3c42f8c10cddb5a4c42dd75e6143bc4f79ce1724859c41e4b9e19975.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2604

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

          Filesize

          28KB

          MD5

          8f99c8b0dbbe4b0d8f9f453dc9cdd95a

          SHA1

          f5552ee8a4e9ffb596c6be86976ae9a1387aa677

          SHA256

          79260c0e9fb2a67797329852f1a04b24f89bf481a573cd749fffb0b3ae27a2a4

          SHA512

          4be1aa185e4e9899ea62ef0554ada6cad5c4313ca127b18223d6fb01e14e0cb22d5a8ed6d2d258c6788e0af95513caac4f0990a1cdd2dd7f1ba3e2260ea33c59

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          37KB

          MD5

          d90e40703ebc8c6e12a028c1f5859abf

          SHA1

          11531c0e6592820b6897867b6e3ceb87079d2654

          SHA256

          78207082fa02984922c0b368f0aa4b63f7c0dd3511c9bcc2846507100c6463ab

          SHA512

          3b78fb01ea72af6c21636551152bac0baa58e011545069fac0b10bb0317d9d92116883fabd90d38b36b958c9a202eec87c1d09581827a61228ad03b95a9c63df

        • memory/2604-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2604-68-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB