Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 01:23

General

  • Target

    b387e7f5a325cb0f105643777a20106023a1d52478bcec9ff5e4d038dfbc21f7.exe

  • Size

    264KB

  • MD5

    e36e4ba342db5d244b93ba0465ac33af

  • SHA1

    296c08eaaa164a7040fda46b92ac29a493f1f74c

  • SHA256

    b387e7f5a325cb0f105643777a20106023a1d52478bcec9ff5e4d038dfbc21f7

  • SHA512

    6bd713fc27836c87791be9ea2e3b5e10a2bf6d43824fb566057407ce19296a18b742481a90164118da21a54a1e2a15af760482971d72611f2ac7d32b87e58c76

  • SSDEEP

    6144:KmCAIuZAIuDMVtM/XSCdtfAIuZAIuDMVtM/XSCdK:IAIuZAIuOYSCd1AIuZAIuOYSCdK

Malware Config

Signatures

  • Renames multiple (2860) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b387e7f5a325cb0f105643777a20106023a1d52478bcec9ff5e4d038dfbc21f7.exe
    "C:\Users\Admin\AppData\Local\Temp\b387e7f5a325cb0f105643777a20106023a1d52478bcec9ff5e4d038dfbc21f7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    264KB

    MD5

    d065d2e0d3eb282f1ddb0eab51d1c462

    SHA1

    a6dd432c5c3e6b3393ea5fef8fbdfbfb2357a29e

    SHA256

    d27b2d1cd1c260c1800b296ce2c59b5ada0d35120a83621f8b99eca57be4805d

    SHA512

    e64557394985d3e69aa426ab49e84d1f1648d86402da8bba4669124c43a1c97119c82bd896d0f7d839b71a49574d70284d63783d341e846772da3213458dbf10

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    273KB

    MD5

    e0a6512c42fbc9855639d3a01b5dcc81

    SHA1

    33af328d0d53f5278bf40d593ec258784389ecf7

    SHA256

    9d2a406320584d893ed6ec35c94f61c8e3d96e2d0e4d62ae83d3a2cfa97eda6d

    SHA512

    0c143152b88b12f038838bf70e6dc69cb11953fc861073ae82721620ddc3e7005247c8cd57b63562211ae078609aec1b53a4b45471c566e1b6a2a88163d82a31

  • memory/2332-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2332-450-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB