Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 20:27

General

  • Target

    24bcdbbdca5ec9bd75ee4f0493256cbbdf85b0ff15c97a2fd8959f5604568481.exe

  • Size

    54KB

  • MD5

    b467501dfd36954e9c4055aa8a00d641

  • SHA1

    0f40ce6dbe8903c270228fb1f915283bfb7f625e

  • SHA256

    24bcdbbdca5ec9bd75ee4f0493256cbbdf85b0ff15c97a2fd8959f5604568481

  • SHA512

    699d7134b736e01c0169b2457871481822d8844a070ab30fc599f38a81da13d51b7e6799f6eccd0df07d7b5a3cc71a8bb313b987718bb959d05261929c451a16

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2r+:V7Zf/FAxTWo5

Malware Config

Signatures

  • Renames multiple (3739) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\24bcdbbdca5ec9bd75ee4f0493256cbbdf85b0ff15c97a2fd8959f5604568481.exe
    "C:\Users\Admin\AppData\Local\Temp\24bcdbbdca5ec9bd75ee4f0493256cbbdf85b0ff15c97a2fd8959f5604568481.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    c3fbb82b3c0dbd75f59ce17903758434

    SHA1

    d6789b721957bfd9d48b3aeda8333a612fa05858

    SHA256

    03c6a133f8ed366a2f3b670f19bc42903ccf43cce9c16bc27babd9a6081d607c

    SHA512

    43667cba8784decc022ff70db003fcc44e1ae7da2998cabcaf29d2c68f19f4c1ceb9dc2d1f70b7828f5cf76d108914c467c906fe1945c8bceb7de7af1e590b67

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    9e08bca2ab39fdbbc63e201038891ea2

    SHA1

    8eca1b8ad92866fcbf841f5febfa2e25220e9840

    SHA256

    3e2e0f61dcc6e0247ea367b5c43bbc45e084d1289ef5a3e38e361204b901fca1

    SHA512

    0e08189dcb274648c33982b6c298ab84777d3f299c23810526b9e022f75955ac15042d2ed11103f4c00f9cb64e902c39db04b9a4d5c34d605a76e957b789c30c

  • memory/3016-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3016-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB