Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 19:13

General

  • Target

    aa331774632f19d59631e7b264cc2ad0N.exe

  • Size

    53KB

  • MD5

    aa331774632f19d59631e7b264cc2ad0

  • SHA1

    5d9cef095f60f123067ba26a1963e1d3f105db0f

  • SHA256

    223a86241b6d9215f5515e0302d1a691a8c1c4d7d5480de336c2285dfdbe8698

  • SHA512

    ee425c0887557fd2f8db03227628475041c181bebb7520677cb8938310f71f37b1a674312a84b28c8c54824a82efb8073a4614a521b704d77e2c7a5be162347e

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIu:CTWn1++PJHJXA/OsIZfzc3/Q8IZT8

Malware Config

Signatures

  • Renames multiple (3272) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa331774632f19d59631e7b264cc2ad0N.exe
    "C:\Users\Admin\AppData\Local\Temp\aa331774632f19d59631e7b264cc2ad0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    2e83ce908f51fcbc35db7bc82edb4727

    SHA1

    4b8a199d6f211de2b68b945b6add7213014f4acb

    SHA256

    ebf4475bced940c8e47b562446b90431fd48755f4b17da82352f8f49240bbe0d

    SHA512

    2922e38b35cd5fc779a304eec87e3b433fc05d3ef20d12e8e02e7e4ea3160a5bb0f2c52df57713b264179d37b01b48f6b788d1ba76880490e170682275b0a575

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    26c9c49641fdfa45f6dd35c2f9413412

    SHA1

    aa2cb0139b5ffddc991eea1d70963f70403f1808

    SHA256

    b01fcfffb041b381d0e22c1c4cd33ac7e267d5b2b0a09292d8e3752b97c6246e

    SHA512

    9b2c6bd7559c8f2349935767b2e3a508e7a0041928bd6869a7564286cca3b0863bc62dff992caeb34c0d0d0ea87bdc46aae883e647c645bd174d973571513756

  • memory/2372-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2372-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB