Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 19:57

General

  • Target

    1ac51f9472c8c04d81885c5f312eaa1fc4bc0693e65caa3bb6ba1a32a68b1662.exe

  • Size

    87KB

  • MD5

    b263c48ccf9e48032c92a0178e08dfe9

  • SHA1

    1bc0ec7c92b23472e509538fe0800494b8385c46

  • SHA256

    1ac51f9472c8c04d81885c5f312eaa1fc4bc0693e65caa3bb6ba1a32a68b1662

  • SHA512

    2d835652931e2abf4ab4dd1047cf9633ecba3c42a2a8f48ec97fae7bb1173632831635b66c617e63d8c38bb89ba6a11b244f00cf212b130f715bc421a3772207

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rF:V7Zf/FAxTWoFTWpJY6IY6Q

Malware Config

Signatures

  • Renames multiple (3537) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ac51f9472c8c04d81885c5f312eaa1fc4bc0693e65caa3bb6ba1a32a68b1662.exe
    "C:\Users\Admin\AppData\Local\Temp\1ac51f9472c8c04d81885c5f312eaa1fc4bc0693e65caa3bb6ba1a32a68b1662.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    87KB

    MD5

    3ad0dfb2d833cd1ffbf2c19d2ba18726

    SHA1

    cdff2b86e96a55dc97dc199434f2f3c0339aac18

    SHA256

    432fc855351d2a8237abbf297f1d0e3dddf081fc6c122eead2d0e792b77fe239

    SHA512

    2b01277cb14a82a6c6181abd217b8df62c894302450b19783d4a141a01a36c687e20c8a80de624e04a3682c9e2201b5c4f9db5edfa335285df03073795afb2f2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    96KB

    MD5

    8a412075288f53e3cd6ec07906b10f09

    SHA1

    1ca2d75c73977ce39c7b53fb11bd717d5785bf63

    SHA256

    7a03e70ff7fd0702845924bb48fe0e1e592c3347dfc335348cb2bbae29f3e277

    SHA512

    a369bf181feacfc7ccad12105c7d48127b384073e88b7a1ffffbad2398794367e98a5eec71d3c4337b791d0f622d7c18385e0d27bda3765184aea97845f79017

  • memory/2360-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2360-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB