Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 12:13

General

  • Target

    be52dba041939a77a227a5bd251c23b0N.exe

  • Size

    75KB

  • MD5

    be52dba041939a77a227a5bd251c23b0

  • SHA1

    e6c95dcbdf99407e81f86d7ccdbd87eb0fd52300

  • SHA256

    75c9475b8e8cf52e374afc7a14e5a01b20e1c8377025d4bfaae955be94787b68

  • SHA512

    920c2ac5a3a7743c3d417c2cdac5ac759d6e05100053434d22937c67688745eda95d8599558b34aa26b554ad280343db582b4c363fafd6114751338bc70d06c2

  • SSDEEP

    1536:V7Zf/FAxTWoJJB7LD2I2IMTW7JJB7LD2I2IX:fny1tD33TtD33X

Malware Config

Signatures

  • Renames multiple (3226) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\be52dba041939a77a227a5bd251c23b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\be52dba041939a77a227a5bd251c23b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    3725a4f58c390f793ac7e16330557f4a

    SHA1

    b5f665a0947e8c96b8646899037334b2d980a061

    SHA256

    585428f8d210dad37ae70d4839e9af0c3a40a8af5e4e33f44953148eec887abe

    SHA512

    5d6ab36e855441d127c494e5f353fce66eecf42da81ef3ee43ec9f118252219fed2cc95b62ab59ff3c325fd255c2cdc3e6edad5b2ec11c74fcc84a23491a9241

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    84KB

    MD5

    b1f82d17d70ccb8ef540345d47dfa89e

    SHA1

    692b0fa4770f95caf65c692d285091e5f804409c

    SHA256

    fae4d2b9c6fe064404886d66147b480db4776e98a36f3c4c57fd903c4ee0f206

    SHA512

    94083a4a54b3a1cafa0cc981b74519f282f20f3f6f18cf2e9e6acf50b3c48bd6422bdbfffc5319df140d4e3247bdeb96a1c636ea03a80231e49abcac98024033

  • memory/2704-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2704-664-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB