Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 19:31

General

  • Target

    006af29e9c802963391b7351995387010678eaddc024f98dc2bb28c5c1041e42.exe

  • Size

    56KB

  • MD5

    83127145430e5e43f02c321b8dc88e0b

  • SHA1

    c7ff375a93eb4428f2a307100b0d25027970b2f6

  • SHA256

    006af29e9c802963391b7351995387010678eaddc024f98dc2bb28c5c1041e42

  • SHA512

    4da3ac569cbe98fd86aef7110d267289bf5d28fd38e624d228746fd4537314ae7307702dbbb1a9ea2e793022f31827a664e33c0662e440a3b9a8aa829515bb42

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJTU3U2lRtJfOfJmVJmo:V7Zf/FAxTWoJJTU3UytJfOfJmVJmo

Malware Config

Signatures

  • Renames multiple (713) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\006af29e9c802963391b7351995387010678eaddc024f98dc2bb28c5c1041e42.exe
    "C:\Users\Admin\AppData\Local\Temp\006af29e9c802963391b7351995387010678eaddc024f98dc2bb28c5c1041e42.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    21c38070b2fffb26d2fa735f493a3ba1

    SHA1

    a3b40d07fd7e4ad9c9a998710006d1c4809022f6

    SHA256

    51a12f725480ffe7387f2832527bff1e661554eeebb089ebc80bf5a2b4dae569

    SHA512

    b233ff9c3820fa1461d72cce64267dad1561003c153a09b5fca463b92fe74c461e17ebe3a7dc00b3df411f6bfe3c8c71befa99c87bcf27c441e1b1f4a1a157f6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    4566ee1a723a0054f6001af279904757

    SHA1

    abd1b99bc18ba69332ebefbf15da47edc78a8a30

    SHA256

    709eaa462b65dfbb901300c79ca9efa5eeb94d80ae6c83d26d3fd0eb5c09f8ff

    SHA512

    be063950bf86345a04915bc404722dd3dbaf0d90a6936ee578768373408ba74bf22f3efb93e36504368dd1d33b7d009c6394be2bd8491dc99dbfd08d100da51b

  • memory/1908-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1908-26-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB