Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 04:33

General

  • Target

    6470c51fca5815da1ae13ae4a26f5bd0N.exe

  • Size

    56KB

  • MD5

    6470c51fca5815da1ae13ae4a26f5bd0

  • SHA1

    58f73d42d57ee6c4781ac92ec7fdd22ce5ca0a80

  • SHA256

    dd3226682b9ab5a46681c99770af54b742699410f10607bb39e8aafa53310fdc

  • SHA512

    031f9c79de9bc4deff78837e7e254481c5b32f057a4a805a2aaab2a5e1c612b17d0d8137f6334425a7d82c5c0695cfda1dbf3d895135da242bec353d6f8daa24

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8NCuXYRY5I2IX:KQSoDuXuv3X

Malware Config

Signatures

  • Renames multiple (3201) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6470c51fca5815da1ae13ae4a26f5bd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\6470c51fca5815da1ae13ae4a26f5bd0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    924114fd55149dc57cb6152fb7268150

    SHA1

    ca38d27041ea98268e11aeda105ed8b47da0b034

    SHA256

    f7a5e32b327f293c8db7c336b2a3857ef5baae90cf78e3c8b0db169d5c303552

    SHA512

    ed396bab5eb97a17e7dc0a7b017fb5ababc097dc42ad3f25735059907041bd0309c1bf2d2f9714440a6e9552b9e61361b14c7426f48666214f4de5cc91798b94

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    8e86a6674e7711e60df28931a4b06011

    SHA1

    b043cdbc6c137de17c175ec3dc611e403503ee14

    SHA256

    ae04c478715ccb54b08e9a9e846ad7b117f8d3f9bf893e7e45ba3f86afbc8c2a

    SHA512

    f370c5bd58fb67c80c340d33450bec0541a080201ac3466bff3654073c1c0026afc0645e9eee5290d5eb2057b85ff16263ef152f75855c9aba8912e513237db4

  • memory/1676-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1676-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB