Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 13:59

General

  • Target

    beae0cbb1b7753ca349aca996adff620N.exe

  • Size

    500KB

  • MD5

    beae0cbb1b7753ca349aca996adff620

  • SHA1

    81c38e8cb79473a12d2ab882369f099c77ba4f84

  • SHA256

    677498cfcf2c19195fd4087e90e7127410497b2efd6cd405c7f63e3674a5047d

  • SHA512

    07bc9e3bf6899fb550d0bdf0fa2a6c0e6a49789bb038e565ae9b351c62b5b385034527214c03c7d37ed536c52b145b88451fecb25402005181163513396e0b72

  • SSDEEP

    6144:KbE42KWdacnZJqwCQttBaaczwDirAQ3DeQ7DluUBq2:y2KWdacnXqwCwt4acxAQ3DeGDlt7

Malware Config

Signatures

  • Renames multiple (1391) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\beae0cbb1b7753ca349aca996adff620N.exe
    "C:\Users\Admin\AppData\Local\Temp\beae0cbb1b7753ca349aca996adff620N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2548

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

          Filesize

          501KB

          MD5

          38c14a0c77a9587c46b0db7ac2a6bd07

          SHA1

          e38f8905a07318271198a321ffc80c256f8068a0

          SHA256

          309d536f0345af5870978100ed79a3daff22615f106cca20df70b5572b3a0c06

          SHA512

          83c4f3699b1eb49a487b3e5b6123dc60212e9a9fc9237c10489a66da5d3d724090df2dd7935a06f417f422e96a4811c9bb30e68fa89a9fc27d97c335793c77dc

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          510KB

          MD5

          98bbe8c257958a377a4a4e1048805070

          SHA1

          c152e85c49c5021ae72b4d609aec418ce4b83540

          SHA256

          0f0e8439e7fb408c6116072333ffd97cf84f24d5648446713a66124f5fb8987f

          SHA512

          56f6932614be6fb8b76caf052b50b5a9304d81348ee3c1452ecd57dc8f346f1817ea6c2e41735f700e719020473dd5deca9d15680b80c4733e244758a4cd55a3

        • memory/2548-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2548-68-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB