Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 18:18

General

  • Target

    083a99496b70f4e81ae784bf8488670f20cffb84767a647a91f6e92bf9f7c7fe.exe

  • Size

    53KB

  • MD5

    df0a39bed16dfb2dd1c733ecc3544e2b

  • SHA1

    ddd96faf9577328f463f1a2fe91e56bf209901fd

  • SHA256

    083a99496b70f4e81ae784bf8488670f20cffb84767a647a91f6e92bf9f7c7fe

  • SHA512

    c5449d259b15c362ab8100854da55b7c58b266ec4ed8bab82db25d9a14b4df231b2e9a242bfd224ae8288cf155629791939edc71647e6fbfc49a3407d406c0fd

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJBZBZaOAOIB3jM2jMHsLzwzou7u8:V7Zf/FAxTWoJJB7LD2I2IHsLMd

Malware Config

Signatures

  • Renames multiple (3751) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\083a99496b70f4e81ae784bf8488670f20cffb84767a647a91f6e92bf9f7c7fe.exe
    "C:\Users\Admin\AppData\Local\Temp\083a99496b70f4e81ae784bf8488670f20cffb84767a647a91f6e92bf9f7c7fe.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    832568f1260266ad8e91b864ecedc53b

    SHA1

    0e61132648493bef3cd262465c930102da9131c9

    SHA256

    227654045868c0b5764cfa00b50c5fc7602128480e3f4d500614a5ce22f4031c

    SHA512

    e0c5723b0aeedd24e4a83e0bfcf56be6391fbf36fd76e6d67c4f9ba4097e0ca673ec54a730f2d83ede9c32f8acbb1d72526cec0a12354a87e38ce17e6257a9da

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    706333d6a205d9ef6ece3e269d5777fe

    SHA1

    96eeb3eff1e9a659fd6b220a8b34377588bb637d

    SHA256

    8f860b0ab94210c72c4fbf7d4e4fe4b23752e1a202a9de0486a363b50309b4a1

    SHA512

    d668c26bc158d77a0f634d80b8a7921afe018a908775401ac5dbad34a54474726be883ebebf687dee3b5bb8ec4cbb49e21ccc01c1ef3ca834ce9140a4509c5e5

  • memory/2064-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2064-652-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB