Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 20:40

General

  • Target

    36d07d60fca2441a03b19a2a4b4fd6283ce9094808611c5043aae4a95624b987.exe

  • Size

    75KB

  • MD5

    7ea71a6106bb801db7703c768c3c0890

  • SHA1

    2e6f8d2ae89dd76f9e433ee3c9e82d3f5a711c08

  • SHA256

    36d07d60fca2441a03b19a2a4b4fd6283ce9094808611c5043aae4a95624b987

  • SHA512

    d7625534263a6bcfba90ee0d88bbdbe10ecf4a3011bfd97e0d982fe52491428aa626259b09b99d7834dbce6948df2b9e7af0e7ff1ce71c53e63edb00daedab42

  • SSDEEP

    1536:V7Zf/FAxTWtnMdyGdyxykn8+o5oJxJ0PYXA5pYxbOpCpFgTJMTTLL:fnyGnLn8+o5oJxJ0PYXA5pY1OpCpFgTE

Malware Config

Signatures

  • Renames multiple (3478) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\36d07d60fca2441a03b19a2a4b4fd6283ce9094808611c5043aae4a95624b987.exe
    "C:\Users\Admin\AppData\Local\Temp\36d07d60fca2441a03b19a2a4b4fd6283ce9094808611c5043aae4a95624b987.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    eda49ad44f8e3654e2fa934926294b4b

    SHA1

    cf9cbc38393bac6f129656bccd2011727ba32fef

    SHA256

    717c0e8ba53ba412a745ba569edd930c2b9bcfb2cb60c615e5f8ddd7176db25c

    SHA512

    89f4e8cd7030d5e3985468b55101aa9d8ce4c90e85e13ed40fe2615fc92a846c3e90124e9f0087041364fb14acacba1fca7a7ea47207bf853d375cf4297aeaff

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    84KB

    MD5

    e070fab1c8c076337cf5d8b83c6f3209

    SHA1

    0abcab42442de4ba756aa3496af15125ab34873f

    SHA256

    6f834ef07c35e2297d36196ef055b952acef9edba503782087cdbae0e1ed19e4

    SHA512

    505da949085bffc44f772f4c0e682d07db1273b16bf77b1427e88a5b8ceb5bb6f8a103c3af122da319319ff5c21cca9cd4c01995e67523d1ef0000ffa175d4de

  • memory/2196-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2196-660-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB