Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 15:05

General

  • Target

    22530da2089a890d9685439b30279450N.exe

  • Size

    25KB

  • MD5

    22530da2089a890d9685439b30279450

  • SHA1

    6d5d8b3dc4e7de384996b0c88758f58587547763

  • SHA256

    63cd43c3b79b8626075f0da1c8284ac9f142455c774323ae2a2980e048d6bc27

  • SHA512

    aa3aa4c6a69c185ca96474078c5661542881b1a204b0125ca2f34f6131fe2e7fd88f36d2a206b981ad72406259dc83a46cd57967a629880d1dcd4df27423f8fe

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNyRq5c5XPd:CTW7JJZENTNyI6hPd

Malware Config

Signatures

  • Renames multiple (2820) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\22530da2089a890d9685439b30279450N.exe
    "C:\Users\Admin\AppData\Local\Temp\22530da2089a890d9685439b30279450N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    26KB

    MD5

    4cef545b9939d31f13d2edd93fe61a2b

    SHA1

    36fc471b1709b1ec2a772327725193269f8fc157

    SHA256

    2b9a32645eecabbff7b66131e5c3e2ba010a8e2114ea1a2047ad3a756603c214

    SHA512

    26def90939f34755b8ff4e9ede1bbfda7d40eb1dedb236e36a130a5177cdff0e2468cc24cf54ef6249e21b5acaf456fe815262222138b22a2ce7dd4c37794200

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    35KB

    MD5

    cbed8cf6840fedd7932f7d1e8319d4eb

    SHA1

    94bc9aa616bc6994978a5795d4a60f73159e74c4

    SHA256

    3589befe00be8f01f8e8b37bc672bfabee05520b96417411979333f2f993939d

    SHA512

    9f10743d9bd80b1519211f377df7ac45fa45bf6a6c18313cb15d88933039b25fc35d93a1f13eddb5f2600d78ead3a2b5702eff54d86442a1be427e8652970a64

  • memory/2012-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2012-68-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB