Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 04:13

General

  • Target

    b84871131be749732b47a4659593da317a6adf8b51cbfecb9de384b5909f1603.exe

  • Size

    33KB

  • MD5

    854fe754268a309ca7172105f30fe192

  • SHA1

    1d8fd6f5cd9eabb4828d4520f35e9ed02cbd9392

  • SHA256

    b84871131be749732b47a4659593da317a6adf8b51cbfecb9de384b5909f1603

  • SHA512

    6921ba0dfee2e1495199cb6fae9aeafd53c16b1870b1dbb5561df7fd2d82252594781f0b91cd3688b6411451b42e75259d33ed1b3f8a991592db593971d3487a

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mdneJEWJEHn:CTW7JJZENTNyl2Sm0mdneJEWJEH

Malware Config

Signatures

  • Renames multiple (3952) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b84871131be749732b47a4659593da317a6adf8b51cbfecb9de384b5909f1603.exe
    "C:\Users\Admin\AppData\Local\Temp\b84871131be749732b47a4659593da317a6adf8b51cbfecb9de384b5909f1603.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    089c18d1071f5b5b092f8c112caaab36

    SHA1

    8afdb90afdc7738531f3ea3d25731f87ffbfc564

    SHA256

    7df04785181d57806cf016936e982e457d6de752636ab87abcd58a60a5aee600

    SHA512

    d82fb2614213cc62b3c24e2e7a9cf56214690cb79f26a00a3d4c82a73d7be93b0fca0ad199780de2ba6180bc89236dc5cc61869b5f44b8c38637c2f12bcaaf40

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    42KB

    MD5

    dc26b9a88ece64dbd1755a8f0f8454e2

    SHA1

    7fd074305bd2f8b9356a24078fe55372cb7cf9f9

    SHA256

    741a61b939b3d4ad0c4e2e96eece7de89c066461632197b8fa4f05a4d1f9e26e

    SHA512

    aab1c986bae94b3b87c63d77bc1a953d7096d048983b53f5b2f160905149ba1ea0f9a27b1d07379ee8a1e9ac92e940abc937923275cd05855e3216b9a87cc27d

  • memory/2404-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2404-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB