Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 18:49

General

  • Target

    10ea72a65fdaeee9204ca6e02070f9fa316b3ab6cce69cd8c1605be0aa13de8f.exe

  • Size

    66KB

  • MD5

    50e187206f583c2e9aa350263806189f

  • SHA1

    cd013d7edcb247cb9eba70a50e5374461c35b9fa

  • SHA256

    10ea72a65fdaeee9204ca6e02070f9fa316b3ab6cce69cd8c1605be0aa13de8f

  • SHA512

    3bf15f4e80873e09acad77bcac7ef0a84dfd6b2632136fdd5be652cf01c7365632066d76cc84f291e7ff2d9725906cdf9b788450fd19d9da35c4740601280de2

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rF:V7Zf/FAxTWtnMdyGdyNQ4NQ4v

Malware Config

Signatures

  • Renames multiple (3618) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\10ea72a65fdaeee9204ca6e02070f9fa316b3ab6cce69cd8c1605be0aa13de8f.exe
    "C:\Users\Admin\AppData\Local\Temp\10ea72a65fdaeee9204ca6e02070f9fa316b3ab6cce69cd8c1605be0aa13de8f.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2360

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

          Filesize

          66KB

          MD5

          d64984679d245f1afc5a048d98a056b8

          SHA1

          1f22a6e9652b9173632df44b306931abbd36eabb

          SHA256

          81aca816519d39210b9299317f549063ff619118cc1df54870bac40f2b64c4f6

          SHA512

          abcc5f5dfd6e1d7dac615ea3cfaf4b33423c6c2054a2553bd3d1374b56edc0baaa65c5537c95cde6ca7c7353bca8f0d9b99a04283a517bce52eac3c0e6776ee3

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          75KB

          MD5

          637eff4978d2098c1f5a21084c511f9f

          SHA1

          28b096905eade5ec92c74b13697a3bec26800c3a

          SHA256

          fca4b9d869525ef6f650d99afa23d2d846f1819f9ab04927d1d11f9ac60d3f5c

          SHA512

          15495ffbb5d83df613fb05b1901329b8a166fb23e7e142bacc7ecf455d4c87f342cc20fe7c8b7afd5a49f94b5b0538f2fd0c1b8586adf69fddf2a48df603bcfc

        • memory/2360-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2360-74-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB