Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 21:10

General

  • Target

    083a15dfc67ebe473de98fb52f35b3990b2dfb117595ee41c471375152e72e9a.exe

  • Size

    113KB

  • MD5

    a3f46b0d0102bf10c5a72c735adcf5f5

  • SHA1

    e6dc2aef124b2ddd2420cf2549161ccf175e105a

  • SHA256

    083a15dfc67ebe473de98fb52f35b3990b2dfb117595ee41c471375152e72e9a

  • SHA512

    8edb9ff380da5e7793af289105f9ed2ed7288782bb5f49aca86062c0a7f0d5d21d045ffce6675522ca20090bbd40a2d67332a7de6c5a63d42e88df14bc45f295

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI99ojoGRK:V7Zf/FAxTWoJJ7TARK

Malware Config

Signatures

  • Renames multiple (3452) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\083a15dfc67ebe473de98fb52f35b3990b2dfb117595ee41c471375152e72e9a.exe
    "C:\Users\Admin\AppData\Local\Temp\083a15dfc67ebe473de98fb52f35b3990b2dfb117595ee41c471375152e72e9a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    113KB

    MD5

    c4be2d65ce898d45dc8598560b37e470

    SHA1

    df067c865dfbeb24cfb89dc88f3be7a9b96ddc73

    SHA256

    ed622b682b4317dc7494a644c02992a083097f45904c912294668646df39b3b1

    SHA512

    126ef070797d743f54df422ed7d15f0794f8c6d726a6a976e97f5364c0c6098811908326c83990e9896f3347b3be8904b706a266033e3111f659502a9ff63cc3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    122KB

    MD5

    fe115e3506f46f748f6753509c784ade

    SHA1

    083d2daf48b9e3adabe8af25073d9a1308daa385

    SHA256

    ad267a02d9efbc99993862c5a9d6417a5f847352417cb12251bcf9addf3908d9

    SHA512

    3e05cbbe8f19247d4d25b33b094cc8675847781fdeb79014e460a2cac050f10980695f7a18cfc0a778c6aee19ab02594e4834e900bccdfb81004b66087a6b694

  • memory/2572-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2572-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB