Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 03:10

General

  • Target

    d72984baaaf19130414465ac946268e4fa4123c98085bf1c1e4110ef075a431a.exe

  • Size

    97KB

  • MD5

    5069a87f9b5d8b208f09f56cf5a1c7fa

  • SHA1

    85431e2edb1f12b5a4f469f0b67fd9c51c67a986

  • SHA256

    d72984baaaf19130414465ac946268e4fa4123c98085bf1c1e4110ef075a431a

  • SHA512

    116733318e87fec2143dada050ef2785acc25c86da0f9b39cce12934f4feb9edea1a4fd355a59303420b20e3ed916e22af70ad54d4c65617ceb5e0b72351ac7d

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxtjm8sD:fnyiQSoojmHD

Malware Config

Signatures

  • Renames multiple (3553) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d72984baaaf19130414465ac946268e4fa4123c98085bf1c1e4110ef075a431a.exe
    "C:\Users\Admin\AppData\Local\Temp\d72984baaaf19130414465ac946268e4fa4123c98085bf1c1e4110ef075a431a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    97KB

    MD5

    625579a73b581fa717601eb170e1072e

    SHA1

    566ca35f738d2a3696f7bef9fcaa0087e864ff92

    SHA256

    a138b335e169669d125ae7691fe2028cdd650073569275228045e98a4b6d5d7b

    SHA512

    fd527f9edc059c47ef8375d3ec61bfa088c8ade64472e300a9f66afc9b56b8c4a6837f60b9e9b8d9a97ef750712572bc40794aef35aad450798ad4543f812c27

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    106KB

    MD5

    e4bea17c1bf412c5d28b894d6763ba21

    SHA1

    1467a88740fb1c42b4f840bf94f1b714588b783d

    SHA256

    1cfb5c63d595a14b51ee1e9d936fc65acf68da8e6700547afebb9dd33e4af569

    SHA512

    91686d88ed82f740b518fc8d86390295882c83f8e9f9bd29bbf85cd2af1f14713cdf464dab15ef4e1d39d8f86e905a6a3252e376c3e3c8c483c22f8e85e686f2

  • memory/2672-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2672-654-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB