Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 08:23

General

  • Target

    aa6163f608f55dc12bef6486d68995e0N.exe

  • Size

    18KB

  • MD5

    aa6163f608f55dc12bef6486d68995e0

  • SHA1

    39be0addd8850dd9f18e11db7a669f69f1b7d61e

  • SHA256

    2cd9f1f2f2ad8e7d91e0dd73d17c9dbab340d4ceb2fd29db08099edee4262b01

  • SHA512

    f45721d24458059aa998149e4767efdf8d48234f4c1b2650d5e4c9b1d312af74efd8fe5d71eb7f0a79447ddf160c9fc48a7aa7a221d3ebefa852a03965acdb59

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJcbQbf1Oti1JGBQOOiQJhJZafNmT:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJR

Malware Config

Signatures

  • Renames multiple (2696) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa6163f608f55dc12bef6486d68995e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\aa6163f608f55dc12bef6486d68995e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    19KB

    MD5

    8ae432df8b6daff15eba64cd26da63c8

    SHA1

    edafa6a24f06709e0e1616e8edabcda8d0eaaaea

    SHA256

    8d90575a2d1dd5e2bf8e8014abfa7f1cc618d1481b630b78a14e907053ee91db

    SHA512

    6fe6958b040301387939ab4109e465d7b1faccc29bd1a9a11cf27c5e68d1fa552daf9a18c73c0ca1fac7a27c78d0a6d20f449023bf57ebc36525f97b06191c07

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    28KB

    MD5

    8fa2e24cce423b7926e9210cc77ba2f4

    SHA1

    48444773a677e4da205655ac3b9bb1fbd8be0812

    SHA256

    2ff793ac2cb886391b717ee5951f538ee12eaee7b67d272b8ae49b9773b65034

    SHA512

    a76cc18b0b9e55282dddd8a7c336a406b3fd81cd4dc48ac88c3e64a06e99728ef940b3408c8326d0f64d068aff383b1d258390e2482d0d084873b42ed4fb47cb

  • memory/1768-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1768-50-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB