Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 19:26

General

  • Target

    2ded7809f4dbef81cb78ffda9d3f7d03544d8c6dcb0f3ff286a34d1c7fd771f1.exe

  • Size

    42KB

  • MD5

    ff5598ce6f6df85726244d9ce397df71

  • SHA1

    a89be38949fd565cbbae2f98f8fbe5fc6d1da2fa

  • SHA256

    2ded7809f4dbef81cb78ffda9d3f7d03544d8c6dcb0f3ff286a34d1c7fd771f1

  • SHA512

    f848624e6709fbad38e388b254308830503c974a9e6be7ab4ff62409ff31a558f24877ef4f6a198b541e88f9bfe9c8c9183d8ae12285524bb1f49b3dae5dc4d8

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiHoGoFzY:CTW7JJ7TTQoQN

Malware Config

Signatures

  • Renames multiple (3749) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ded7809f4dbef81cb78ffda9d3f7d03544d8c6dcb0f3ff286a34d1c7fd771f1.exe
    "C:\Users\Admin\AppData\Local\Temp\2ded7809f4dbef81cb78ffda9d3f7d03544d8c6dcb0f3ff286a34d1c7fd771f1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    7a12d4b39400565a3429a5262449a50e

    SHA1

    7e045a5a9c0957616597315762d9d44e342723ae

    SHA256

    e7c1764e844961339e64d841ce56b9c4285e7ad4e2833f6658059b2a69c84835

    SHA512

    e2ef42fd8f2013097d6e27972cb66f47a0fb6b23f5e7b4cc01c14cbc7660e037b666ef29cd4000380a931a46508fbe2969e15eb0bf8911476fbfef86d9c50767

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    8330162a25ead7d4a7f6cc476dc7ba38

    SHA1

    4d44a139abe369f48b948851feab552d0e8db077

    SHA256

    1ebd83276ab55b745803eb9876940eaff84ed70dfe990702691c81be57ae0d5f

    SHA512

    7ece36250e6acdf56b422cd17137cc4443a12679357aab40835a5db241aca6b9d2ceabc5097ac7a122b87442ca924fe0a342bccfbc89e96fd91be5606ec5c629

  • memory/1432-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1432-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB