Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 19:06

General

  • Target

    1a8664e95272f11b81f8fa8f5f57a8aca9c6c6ac4cfc0d9609b8480385cc6ecc.exe

  • Size

    45KB

  • MD5

    a86744ad2596957e545bf74d0c29a426

  • SHA1

    49de4f8e8d61e17ff2a0e6f77c60687cabf2c6e2

  • SHA256

    1a8664e95272f11b81f8fa8f5f57a8aca9c6c6ac4cfc0d9609b8480385cc6ecc

  • SHA512

    a082e493b1beb9360bcf8712bc3d5c823b2591a0e1d4a6f1948c7b9961ae2e16f69df07718da3845b5a3d927ed10ff5c7219e2fde686ccc5c768aa69be245d36

  • SSDEEP

    384:FBt7Br5xjL2Kd5AsAoh6n5eaOlIBXDaU7CPKK0TIh6SjeYDTcYDTwWsqWsYyk+ym:V7Blpf/FAK65euBT37CPKK0SjuWFWY

Malware Config

Signatures

  • Renames multiple (3758) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a8664e95272f11b81f8fa8f5f57a8aca9c6c6ac4cfc0d9609b8480385cc6ecc.exe
    "C:\Users\Admin\AppData\Local\Temp\1a8664e95272f11b81f8fa8f5f57a8aca9c6c6ac4cfc0d9609b8480385cc6ecc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    8ad2476a53228922df1b50bf966f2760

    SHA1

    e8dca5ef2518c1b0421e2f62d15a1785ac9e4e2f

    SHA256

    e93d5fd1c3f54d8506dc558e7a626e1daf9cf007ee0f4432326f5aeadb1401b5

    SHA512

    bf11a551eda9c6a9da5fad5cd5f8c4ac3c1ff61f1acf2811244e7d1b20de3a356a4f9ac80be990bb22e97bfae4467336f7e2c7061eee02fc58cb800a3263a6ea

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    a7546f1426e3b466837d27ab614059b0

    SHA1

    9a1da36530c399ac2d5e7d76399add87bc241df7

    SHA256

    416daafbfb1f75f38a005949cf3770ebfb2a94dde338a8ffc307f8597a39ef3d

    SHA512

    74362df9e1caee3464199924c21e7b7d8c14163568fb5d354e106a06b205f7cc081c97662654116d4b7d78d82275df3933deee1e211f276404c31fb1f12f5856

  • memory/1716-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1716-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB