Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 18:06

General

  • Target

    014a8cf142ed62008e37a71108d1e0b8540c64e09c6f4dbe35be9088ae76a760.exe

  • Size

    53KB

  • MD5

    d50a6f3004e084335ce603a4327afdbd

  • SHA1

    8421f370e524a6c82867ec1d1058385d91bb7bec

  • SHA256

    014a8cf142ed62008e37a71108d1e0b8540c64e09c6f4dbe35be9088ae76a760

  • SHA512

    c474dc9a0c9a04b9326da6f68019e906a8e3ff2de30861a88f2b7196c7aebde0a80facc57bf9ad008ab9f284d7633d000c167fa5f1c222c721bad4cb63b8f26b

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2re:V7Zf/FAxTWK6HyF

Malware Config

Signatures

  • Renames multiple (3460) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\014a8cf142ed62008e37a71108d1e0b8540c64e09c6f4dbe35be9088ae76a760.exe
    "C:\Users\Admin\AppData\Local\Temp\014a8cf142ed62008e37a71108d1e0b8540c64e09c6f4dbe35be9088ae76a760.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    2173007df8e104101bd0e38d81d8f8fd

    SHA1

    70a74d8faff947f60d1d5808d290de3af7066141

    SHA256

    66741fae6ea6d85b4bb69d5b265143531b8b545a8d13dd48728d7b77d96a0f7c

    SHA512

    787160b2bd2ba977246618f351fe380a5ef3c31e81daed8c4ae34e7aa45d4e0a7698ef814aad899edae18efc6bbcdfc64fca54334a418661a1653ec7e700f6c8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    5758f647b674eb441ed34fd0cd50d133

    SHA1

    c6f950bde4911550e9fa4d38cd3b73ea2e41a028

    SHA256

    dceb7a54571aeedd138e6efff92c265588df7ec4ee14476e69d52574604294ab

    SHA512

    dc03c0652055798e10ae33d9447bfa2a6bdb72258be7f232f91733713926abb77aa72639d4d3b03db42fb430440175d13da15d382ff50b717c507eb265f8e660

  • memory/1856-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1856-398-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB