Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12/08/2024, 01:05

General

  • Target

    ae2ce79dca56ab395127624c4f717e05188223685910ccbb78c852772c7944da.exe

  • Size

    29KB

  • MD5

    9a5aefd184c6d3320ec6dcb624248fad

  • SHA1

    227d74ab378ce146c3503493e301554976a01285

  • SHA256

    ae2ce79dca56ab395127624c4f717e05188223685910ccbb78c852772c7944da

  • SHA512

    d2875ce131cf9c71306800a044f0c95f0a10e164d6f19bb83e1d8a7a81d90f816fee4fc984c81e76b6b3d94afafce81ee8f594dbb810c56702409f8404a46c1b

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKsl:CTW7JJZENTNyoKIKU

Malware Config

Signatures

  • Renames multiple (4117) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae2ce79dca56ab395127624c4f717e05188223685910ccbb78c852772c7944da.exe
    "C:\Users\Admin\AppData\Local\Temp\ae2ce79dca56ab395127624c4f717e05188223685910ccbb78c852772c7944da.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    29KB

    MD5

    531fbc7fd43d26cc798f0375eb985e0f

    SHA1

    d3b474985210eac2178f85c5ce069e80c4c82294

    SHA256

    99a992cc2fde0fb1e4e2690d3ffa34bd816ddc6d7f17d634e8aae0135f8c8769

    SHA512

    1dd87badcdf374c31610299e6b878860441b06ba5f0ca6b19f7fcef2a1a109881f98ec08a63f28087e3ca4627522fdcbc515caea09976754575ddde658594520

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    38KB

    MD5

    c4f3d4ccd20a6f217551e03324b92ed3

    SHA1

    305d5d44ddabfe9d616cc1c126e97c38cdbea49d

    SHA256

    cad585b669c6c007d223be0994f7e465bc3d02a8a30c8fd42161d0294dbaa4de

    SHA512

    6204815411683792f2783190d766c5873de4071a733b7fa2cf05765e6f9c2a9a449020cdbfd4368afd6b1c2bf07aab93f359a4db9bbf7734a223d44c136d0fe6

  • memory/2840-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2840-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB