Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2024 05:38

General

  • Target

    58bfc053eea9768f44b0c78b8a4ba440N.exe

  • Size

    51KB

  • MD5

    58bfc053eea9768f44b0c78b8a4ba440

  • SHA1

    c5a206ad98f8a27a62ba7ad5521beea85878e80f

  • SHA256

    1b07151ce740f7fa02a690e71a182e4066f9357409fd18d8689ea21f91fa2e03

  • SHA512

    9a6cce74f790bb4d88c663656906f26b6977a701abc306c42a8b7c0794b33ac330e052aa8c7501c2293e22754163cf804f9ae48f4a4b1ff355c260165f3332ad

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mNM:V7Zf/FAxTWoJJZENTNyl2Sm0mNTY

Malware Config

Signatures

  • Renames multiple (3436) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\58bfc053eea9768f44b0c78b8a4ba440N.exe
    "C:\Users\Admin\AppData\Local\Temp\58bfc053eea9768f44b0c78b8a4ba440N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    aece4ec4d715a17fb009345512ef4b35

    SHA1

    dbda4af1636399f2b0528211cc65d01fbe20323a

    SHA256

    fbd498609a3889f91c59ada20af5e68f25d679ead01b03731822be024810f943

    SHA512

    af1ffcb27ad860dc7a7b9947e7920bbfd73a0fbfd9768fdafd0a2ae7f9dda966d7528adb39ff46bb873d10ef1a4e3e87e78fc7b14967f4ed84e71bccc1ef96f1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    9696d1a52574fb53753c3f8944286dc8

    SHA1

    5d2bfd2574d96f8f9c129588d76f684aaee0dc29

    SHA256

    4f19eaea2ffbde7c7b2593396443c5150b7a6ce198e76b81f979a6c7a10c8588

    SHA512

    ad41a20054f3e6df26c5f6862b52e62b8de6505cb8722a0e15c293363f00167445e2d38304144bda6ccffa03d4969e62626ca46c71817b208238b16461e4a568

  • memory/2328-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2328-668-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB