Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 23:21

General

  • Target

    ad7cbfbe28bba702e74e82f4260c6f40db49849d97dc3befbf02e00eb8ae83e7.exe

  • Size

    90KB

  • MD5

    9864007c31be7cbcb1a37dfb803bb285

  • SHA1

    9256b38a71ec239a36affcba647cc64cd2585d40

  • SHA256

    ad7cbfbe28bba702e74e82f4260c6f40db49849d97dc3befbf02e00eb8ae83e7

  • SHA512

    bb34b5eca0650a0bd21f9179987b7605a1ef343e7cf426308c147153956980292bf04c74a8428c591213235c7cdf4db31f9cb172a85633c1be53067d8607c1f0

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiZBT37CPK:V7Zf/FAxTWoJJ7TTQoQjTW7JJ7TTQoQh

Malware Config

Signatures

  • Renames multiple (3699) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad7cbfbe28bba702e74e82f4260c6f40db49849d97dc3befbf02e00eb8ae83e7.exe
    "C:\Users\Admin\AppData\Local\Temp\ad7cbfbe28bba702e74e82f4260c6f40db49849d97dc3befbf02e00eb8ae83e7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    91KB

    MD5

    0c8dedcc2b6b1c9266280e9d7d9b0c1e

    SHA1

    e9855f0d2c99da8e1a6f971954545c06018ed244

    SHA256

    3d79c8a6dc3b9b3dfce744c5483c9d45d918f2372a35ea3465bc5fa15af013b4

    SHA512

    ca04976c33ea2952112a1c63c59083788e8c34f279b81c2dbb9a80b752da2d6cd03f180c5aef8ae4f4cc6431abaaaa8be77e2569de654285eb109afd27192595

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    99KB

    MD5

    d94c8eb4dc2a89b068c366d6802ccef7

    SHA1

    ddf0fe731bcb22dbd87e70f66e28679a8dbd2a6f

    SHA256

    131616eb53010882da5f0bf62fb99b24b58080b4f100a40aba86d16f313b5a9d

    SHA512

    2dab65e111e6d8bce122c23b5ab92ae01853d18cbfd3e6cd9c31df6bd7d8d78589779aae5536631ca96bef6ab640b1ea52ba426d57c862c16dbedc0758bf9bad

  • memory/2316-3-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB