Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 02:11

General

  • Target

    ea5ca60835f57f0917f46d6a412ab8e0N.exe

  • Size

    70KB

  • MD5

    ea5ca60835f57f0917f46d6a412ab8e0

  • SHA1

    b0f4e74108b3ff9582a7e93b78b108fe02e83ff0

  • SHA256

    9ac5babe70b9cf082681049b599012c81d83eb7e7e6d924f40c46f276c3d7737

  • SHA512

    3b2d2572de037a33793fcea58916fb07bff101d115a5c8db5b2aad717390ddb2a01809dbc3cd655d77d91b4f37ff305dacce0e0ab367082d6e9cbfdebc3865fd

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8Q8/8fC5:enaypQSoskK

Malware Config

Signatures

  • Renames multiple (3319) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea5ca60835f57f0917f46d6a412ab8e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ea5ca60835f57f0917f46d6a412ab8e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    71KB

    MD5

    e2402b216805e7116316461b80b9479a

    SHA1

    0df33576a53973a11c66aca11b4e3a617ecf3161

    SHA256

    1fe1f01fa66399c104679d4dc95cf9549a5d6ed06cb2321f4a185c45a87a8426

    SHA512

    507b8196b6481d67c8382fcff3cd9cfc9d7efea72e3996f13279d1938b67e5b656caaab31057e4ec5df521cfd8edef6c8ab029277c79fa8caee12acb84f72bb7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    80KB

    MD5

    896463a42ee07d6ba419845b6bec16e7

    SHA1

    85694cded16eccbf92e2287a8f6ae8bd44c25873

    SHA256

    b15ba42d429f992b7bcded6320f0f574127b069503fba7185cd012e5396accc8

    SHA512

    5c4672a220d5e8a05c12b02f21f1c601d50426904cf04e6fbaff20d1a7c987a68b491781c82f39ed4a8e2a21e039434c9f51544ec64f4dc669e7a78764eb52db

  • memory/2916-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2916-668-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB