Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 01:50

General

  • Target

    be10f2ebbc26aa8b55d0d527ca741040d31c67fcd7ce7039df812cb7f4568518.exe

  • Size

    48KB

  • MD5

    6fa7c1e2c431c827d64e7a94ff33aef6

  • SHA1

    10a4c4723c91e9913e7e0dbf7f3101969c3c5ad5

  • SHA256

    be10f2ebbc26aa8b55d0d527ca741040d31c67fcd7ce7039df812cb7f4568518

  • SHA512

    0df47a9a8b73281aaacaec43145af1d371ab6e8f3bcb96ce90760dc7750d3d5a2410c48bf08fb98b6861a2f7145e7721bc0bfaa0dbe161ec1081ff515c28d9cd

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8+g9VyjVyn:KQSok

Malware Config

Signatures

  • Renames multiple (3954) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\be10f2ebbc26aa8b55d0d527ca741040d31c67fcd7ce7039df812cb7f4568518.exe
    "C:\Users\Admin\AppData\Local\Temp\be10f2ebbc26aa8b55d0d527ca741040d31c67fcd7ce7039df812cb7f4568518.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    0edd8d3192d3cbdf9650782a02dc6b22

    SHA1

    d3ae1297ecdfe9c163ad45113bc303951534c967

    SHA256

    8703714670dcda796a6150a414de21b64e99b331739f2303b589464a24486a63

    SHA512

    a67d641415ec02a8ac9dccc5f1bfd7e13277c197bc0e352ce78c5ba63f60bf4bdf4ced25b49f4eb29c1a00edf887a2be87d0a05c3196f30daf2963baf41de972

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    759800230bbeb0d502f345461980b51a

    SHA1

    80d65bd2b0749cc2632d2e3e2cebd569e8bd9240

    SHA256

    43de2e37bdafc007c9567f1a5ec97fcf8c5c2fa32268df03d30ea22338b7142c

    SHA512

    1cfc84eeafa34d78f66593207395af368db72b46482ce94569efc3865979d289feee6f180f7dec481950570b5af4f31f42b98becb4867711c70268f9051deecd

  • memory/2904-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2904-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB