Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 20:23

General

  • Target

    390745009fa112715419c86b5742b4177b69fa5d9674bf23c0430c2341c465f5.exe

  • Size

    51KB

  • MD5

    43e0c090d787bb7bcd08fd18ba1b44df

  • SHA1

    852bfcb280b87dfd7eab3f7bb1b01fdfb1db2cd8

  • SHA256

    390745009fa112715419c86b5742b4177b69fa5d9674bf23c0430c2341c465f5

  • SHA512

    523fe4a09136e5cb3d7f8f0ab497217923f77880f35b200331c99b0fc98c9854e840029debda22cb2d2e1c0f1d7df63a43cd37658689686a121dc4ed677cae07

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyQYW:V7Zf/FAxTWoJJZENTNyQYW

Malware Config

Signatures

  • Renames multiple (3787) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\390745009fa112715419c86b5742b4177b69fa5d9674bf23c0430c2341c465f5.exe
    "C:\Users\Admin\AppData\Local\Temp\390745009fa112715419c86b5742b4177b69fa5d9674bf23c0430c2341c465f5.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2820

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

          Filesize

          52KB

          MD5

          d48bdab4b9b7313d9d22db5e38d65ecd

          SHA1

          a04493183bde7fc687952704dd486840ca0492c5

          SHA256

          966281ebd5f5fb4da6bb4b059341c56d87e7589d48972e0b4850f11606135458

          SHA512

          5fe3b6088b55566d5f0e7a4bb09876de7dd8ddb552b6012b69c324d7a4165e3dfb15e062594190b0d517e4722b72a2059d6020162c15f2e4a22db1e9297b0182

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          61KB

          MD5

          a39a530beac6d4897673f359b94ebf7a

          SHA1

          23735344be47f4c027529bea2ab9016f39343023

          SHA256

          660453bb4d2114a946c3d88f0603942656a9ae220a9c770b2cd0c9177e104d81

          SHA512

          53c29ff3a52d1ad012041847bb2cbc0657634baf76170af63e24938e0f4fec560a3c2427c65a111333c8cafbc354467cf94f42cc76241cca2f9d974fe45d071e

        • memory/2820-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2820-658-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB