Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2024 01:09

General

  • Target

    a9597f5fcd33ed51cccf23700f034db2f17661f9e82a68caef3b1a62877d0fab.exe

  • Size

    124KB

  • MD5

    078e022a49a376a62e9e0028065c3de4

  • SHA1

    1a37ad5af0f0546805900b62dd759c06739dab05

  • SHA256

    a9597f5fcd33ed51cccf23700f034db2f17661f9e82a68caef3b1a62877d0fab

  • SHA512

    bf6d04c305a7ec695215c3ce12f4dd79fc99f27ddc95d645a910c1f6ab2e6785ab5e2daa9ee9e45685e0b602ddaf85eb27fd386a0e284f3efc6e9e7c67012c14

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5vTWn1++PJHJXA/OsIZfzc3/Q8zxD:fnyiQSox5bQSox5owO

Malware Config

Signatures

  • Renames multiple (3453) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9597f5fcd33ed51cccf23700f034db2f17661f9e82a68caef3b1a62877d0fab.exe
    "C:\Users\Admin\AppData\Local\Temp\a9597f5fcd33ed51cccf23700f034db2f17661f9e82a68caef3b1a62877d0fab.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    124KB

    MD5

    7fe32827b3fdad359896cfe491a983c3

    SHA1

    b80639e94671385248b7a9fd8a6911ea378fb8e9

    SHA256

    ee639324a7c59e67bdc5842e0ab83dcf0ee3b85e59feb6a17defea83ab6f4f76

    SHA512

    2e7a8951211df672d057919a46c42bf9b3895aca7b0cea34a22639021560be4dbda9b7febb2931bf27c0ace07f0595132ab2ac51b5ae83d98768425729b61bb1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    133KB

    MD5

    57ead53218aad216d4f4cdfce0d0f28a

    SHA1

    a9273a33c4928b440316d7345c6c366d7b4f7807

    SHA256

    bfd593f885ec45f326207050c4937110ea0d0719e48f8458be72802814da2a72

    SHA512

    fbecc8d7520c9d9406068b456e6dd8ac8a0d104a2165b7bb5e9bd873d78476363f04963f85917243a3eb6d089a11330bc9bbe1e5d5599c311c90104171ca47a2

  • memory/2212-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2212-652-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB