Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 04:58

General

  • Target

    bdf7b3c9efb368cf7d14fd84ab2e7ac191ea3fa0728910434b19ae936fb233d7.exe

  • Size

    78KB

  • MD5

    2e53075113e05da34a5c3ad36643486d

  • SHA1

    5e6032ec3047c93bd570436beae57a883608a690

  • SHA256

    bdf7b3c9efb368cf7d14fd84ab2e7ac191ea3fa0728910434b19ae936fb233d7

  • SHA512

    fc2de554b3326312eba93ada750efa7bcd362b18615d5b8913d8f447cfec1728d4063c807659ff688d07b2e9288485fde980ee9a4f8d063c90c78c211512265f

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZT/:fnyiQSo7Zr

Malware Config

Signatures

  • Renames multiple (3681) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdf7b3c9efb368cf7d14fd84ab2e7ac191ea3fa0728910434b19ae936fb233d7.exe
    "C:\Users\Admin\AppData\Local\Temp\bdf7b3c9efb368cf7d14fd84ab2e7ac191ea3fa0728910434b19ae936fb233d7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    78KB

    MD5

    25dcbd9745817353fa95caa74c4abb23

    SHA1

    88e5e2eaaaa2568da35e573cbb93b80f78ad4160

    SHA256

    d51c8be7b58779542f837ddf4dc6d80bc8fb173469ded035086f78bfff199b79

    SHA512

    6695fe7ce5ce94847466491eb9a6e25c259ae3d693883fbf3dc1e52d93224952255a194f24b75493bfc69631b9123318431cc1c23b1efdb83ccabc8959abdb17

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    87KB

    MD5

    2e9c27d00eb3c25cc90db7dd3066ac26

    SHA1

    5342b662b9d867aa92a48b945f83eca2159fa45a

    SHA256

    2bccfe62ae215b8dbc93dd6caf7ef35d3c8d5107d6dc1d4600e881c25d401639

    SHA512

    0d8ce042511bd069fdcc549160299f5aaebe5ce9c9f2114698019180a7177b3621ff8612fca3b8ae98a0f96c9aa38df9fefd10fee3c6b3fc89c3d41a332173e9

  • memory/2112-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2112-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB