Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 02:25

General

  • Target

    960ee2a99a684fc03d99e37d073f30dd30917849b3a4944b2cc55ee55d2ae3c4.exe

  • Size

    51KB

  • MD5

    90a77ed6a065d9efb835c08fe83bfbdc

  • SHA1

    20ad5a0e840ad9b6cdc6215b9c055b68603f73b8

  • SHA256

    960ee2a99a684fc03d99e37d073f30dd30917849b3a4944b2cc55ee55d2ae3c4

  • SHA512

    b38642106aa3fe42b54e309610872dd87fbd2b36c2fe95c7148cee10249cb72a325e20823731acf18b14a0da6b73ee722eb524b1eb521ceb21b011728ed194d0

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9f/Gum/Guv:V7Zf/FAxTWoJJ7TA

Malware Config

Signatures

  • Renames multiple (3820) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\960ee2a99a684fc03d99e37d073f30dd30917849b3a4944b2cc55ee55d2ae3c4.exe
    "C:\Users\Admin\AppData\Local\Temp\960ee2a99a684fc03d99e37d073f30dd30917849b3a4944b2cc55ee55d2ae3c4.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    6f106cd62ae746da17cafeb5df7688e1

    SHA1

    c047805e3323c862a63b49b4c7a6a84fe249091f

    SHA256

    c2e38a2af19cd9af6fbd7a5d21544ad40aa60881facd33d99507c73a107f9dde

    SHA512

    d70542df3be778e75601a15c7421f0ab05c8e7c4e46bfded3ed7bbc013b2b5db4d9bc21d540e2a0c3ef8557cde65c3bdf35341b76b7d291ade961abfef7e1b73

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    d2776f2d7510a4834cd1155c28033f89

    SHA1

    95f309a8da654c447972b9e4fd2700b31e236c5d

    SHA256

    9a421e91ecadaa7619a208471311b454a9c99f5bc39fbe5b6858b34fd9ac7bed

    SHA512

    d324ae38310da8980e3ff40b5dd80978810b7b1423050e166f71a963407a11ae3662e88c6d1855a056110924195efc2b7fd817551fe935b8df6852064b3711fd

  • memory/552-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB