Analysis

  • max time kernel
    150s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 23:00

General

  • Target

    73ac6cea4233159c6a02536cb65306c1305e40af0a13d4de512db1217f252f1f.exe

  • Size

    69KB

  • MD5

    0934c66a2abedefad6e72116d6ed5738

  • SHA1

    26734d03c4134856f6611dad0fc69c795599f57f

  • SHA256

    73ac6cea4233159c6a02536cb65306c1305e40af0a13d4de512db1217f252f1f

  • SHA512

    aa716742715dda22f574ad4576d300a85dc3d7c86a9d8a1449267f5c28be558f89eb9806af02ab4632c666bef3cd71e0cb9c2a02a979f41d241ae40cfd6c57ee

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2ro:V7Zf/FAxTWgGpGfKEqhKEq1

Malware Config

Signatures

  • Renames multiple (3752) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\73ac6cea4233159c6a02536cb65306c1305e40af0a13d4de512db1217f252f1f.exe
    "C:\Users\Admin\AppData\Local\Temp\73ac6cea4233159c6a02536cb65306c1305e40af0a13d4de512db1217f252f1f.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    5f80ea2f6531898f959c67db7a5bcd0b

    SHA1

    90f54bde813188747411b59529485a3836091c8b

    SHA256

    d3dfb9fcde4f534f6be76748680a5faae46ba4b1146e4397f18588e33b79ace5

    SHA512

    278080982d3d8c3134240e6910fbddc9a0fb7d7154b5b567241ef4fd1b77dd26e69e4c3ac83275e343cef7a66312368d86fb135be3a213132bb5e270aa053d24

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    78KB

    MD5

    2655b9797c66af68c433bb16a3ef2957

    SHA1

    3cd17b862dd8fd4b6f2599b75933a27dfea909df

    SHA256

    87e80f1ee1f64b5c66087285a014ef164ffd151795d13cb4d4fd4c5b5f2416ac

    SHA512

    24df6e33b3f0c036518773378e801f785abe4a37993e8ed6c83e59b5bc1375435d88b3e0785285a6a7f97309b281e51ffbae5c566ff5749c6caa8d8bca3a5b42

  • memory/2716-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2716-662-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB