Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 00:46

General

  • Target

    da243835565835b00d07f60c61d31f6a14e39ef5da24b1ec056769cf6dafdb2c.exe

  • Size

    41KB

  • MD5

    f13ee603bf765d68c4f9ad0d3ec26619

  • SHA1

    dee0a63caf2dc875b3c905d5f944bb90fb4d9b85

  • SHA256

    da243835565835b00d07f60c61d31f6a14e39ef5da24b1ec056769cf6dafdb2c

  • SHA512

    53e30a22deaaa9ac01dc92c8523076e794d0607b367e6da627c2c856cddc86b1ad3e60c0908ebe1ef16dbe87684b00ea490cccde227277008b52eb979fd03593

  • SSDEEP

    384:FBt7Br5xjL2Kd5AsAoh6n5eaOlIBXDaU7CPKK0TIh6SjeYDTcYDTkZf:V7Blpf/FAK65euBT37CPKK0SjU

Malware Config

Signatures

  • Renames multiple (4084) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\da243835565835b00d07f60c61d31f6a14e39ef5da24b1ec056769cf6dafdb2c.exe
    "C:\Users\Admin\AppData\Local\Temp\da243835565835b00d07f60c61d31f6a14e39ef5da24b1ec056769cf6dafdb2c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2692

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

          Filesize

          42KB

          MD5

          31c87c7af52df7bffcdd5f5207c51161

          SHA1

          b5b97277e70e4ca8e42ff008ba70f71943f8e3ef

          SHA256

          6e278b7029d9a4130b3289141b3b6ab92d5df7d7bbc82e89f4d97a40b854558c

          SHA512

          d470b36ddaf82d98351bbb2ddb78af855a1f71d5783e97e62d6e81f5c70fb95df8a77dd806d9cb0ad935c6ca02b0090007632cc39cb6f752fad2a9b4b8cba5ce

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          50KB

          MD5

          645f84d9b82b70096ddd89956ada2aba

          SHA1

          a21a4e26377b1c465c0433541bfab74ba459064c

          SHA256

          e4ac362a21a6e2972ffb7faeb3ba6da4cca05ff4a4423b59c7a83af7dfbf4227

          SHA512

          60799b4eb5f5b2d39f7786a0021e0394016bf5b0b8952dd83dcacbfc72e711ace194d2a2c2876d981df6a47d920ae19e2c714dcaa67c73b0ea98cd9a2965dc02

        • memory/2692-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2692-670-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB