Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 19:20

General

  • Target

    1b770bcf965ba0580c878b0f6ed03c8e19548cc66fa32d570b906d7e7582b6c9.exe

  • Size

    83KB

  • MD5

    4367b48945b5c5176fc7ea4cc52c38fc

  • SHA1

    77f5a19b0fcc8ce5077605d6a595b4c3a158dc24

  • SHA256

    1b770bcf965ba0580c878b0f6ed03c8e19548cc66fa32d570b906d7e7582b6c9

  • SHA512

    df18cb4abd9277f9d3434dceea876fd16806eb54a3809bc1e317d6b1f5806541bb26cefa6cc0a9c3380a525a3c4b5e6f9008be98b136430ca64eb27fdb0615e3

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxQiKJAWJAC:fnyiQSop

Malware Config

Signatures

  • Renames multiple (3497) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b770bcf965ba0580c878b0f6ed03c8e19548cc66fa32d570b906d7e7582b6c9.exe
    "C:\Users\Admin\AppData\Local\Temp\1b770bcf965ba0580c878b0f6ed03c8e19548cc66fa32d570b906d7e7582b6c9.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    83KB

    MD5

    e7637da98676ac908398b208632c6bba

    SHA1

    d222293bf318c2318685627d52ef62fa5fcacdcc

    SHA256

    e19b3e8c79a21fb90abe9cd414cebb9585fe7521ae71033613cd87d5057d5ee8

    SHA512

    3562b4fffdca348bf14f65a6dcc1654cccea275a3a0055a3c698ccec37d0fa39cf586494ca232015b0904e1bfe779156e36704cd593ff7edf1e16373a5eaaee2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    92KB

    MD5

    725205ddd57e877b5265c936d43d61c2

    SHA1

    8d29d8cf17a4878e01839395b549b96823d1d970

    SHA256

    1b40684e21e618999ebde812202ce36113636553393a360364e023347be30258

    SHA512

    69b54dce4daaaded9f50f86e8c5ddb81a95a884aae274e355373865a834efbbb06eaa7738da15a8525c9545e43eaaa98d7c468b35e13d21241a0c7617726d956

  • memory/628-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/628-648-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB