Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2024 08:45

General

  • Target

    8531ac2d1ce705bbc2ffda84200f4fa0N.exe

  • Size

    54KB

  • MD5

    8531ac2d1ce705bbc2ffda84200f4fa0

  • SHA1

    62df8dfeea0171dfb14108435604513cc01e6587

  • SHA256

    a3286bd588c5b7d898a259088fdb22196dcd55ef55e6371d9677ea362cc342a7

  • SHA512

    c9b2e7f537d4598e497386728798ba6fa9156c6a27cd43db9891555d0077d0e9949ed336fbc4bb089c5ac01e6f715bd17c1b802b99d493c08b1e4cdc24a552ad

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8+g9VyjVyKQpVQpe:KQSoP+3

Malware Config

Signatures

  • Renames multiple (3238) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8531ac2d1ce705bbc2ffda84200f4fa0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8531ac2d1ce705bbc2ffda84200f4fa0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    bdd327479f1e4332840a1132bf922ecd

    SHA1

    3fe9f23cf294b9c5c99dd9001c5de4c6c7799b94

    SHA256

    c4e2c9ad7fac84b61a136e32da158e2cda12f286dbe0c72a6c5b84ebba790692

    SHA512

    3d695d03f7394ef82dd8a6e6fdb3965a76e4508126f7585b441c3753f8d247bde162a3094a48f91e1e8ffdb26837e0e6507621bfa373a21004b575bef188efb7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    6a64ab6fc573c5dbb400e4a8c5e9c458

    SHA1

    b37a882c2632e28f9f35e1b5738a98c584ce9dc7

    SHA256

    c294df16a431d8cb080793bf3d36a80cda182187ddd1022d9220e6ff35203ae0

    SHA512

    5898dc5dee7f6e020e49c35562e99de4c12be417fd643c39782c6de9f6cfe4f2d57d74fc1131576b1b10ef412a2b6485b44a58c50bf593490d589153d3ffcfed

  • memory/2112-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2112-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB