Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 00:14

General

  • Target

    89f1d38a2ac2944368fb13c36a1d910ea5bb946f0106bba1af3c4d1731c5b99a.exe

  • Size

    52KB

  • MD5

    33469b6b6257bea3be7cedb127abef1d

  • SHA1

    3e2cea0f180c47f59fddcb0390254080e609821d

  • SHA256

    89f1d38a2ac2944368fb13c36a1d910ea5bb946f0106bba1af3c4d1731c5b99a

  • SHA512

    89cf5b795b5af40832f9e275d253400a62ffe5bff15b7bacfd33706590d67fb8be3d1548e4d0a5aff8e1b7d6b57edb3bfed20068518cbb001690a2a2878d1bdb

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9DQ4NQ4z:V7Zf/FAxTWoJJ7TVQ4NQ4z

Malware Config

Signatures

  • Renames multiple (3755) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\89f1d38a2ac2944368fb13c36a1d910ea5bb946f0106bba1af3c4d1731c5b99a.exe
    "C:\Users\Admin\AppData\Local\Temp\89f1d38a2ac2944368fb13c36a1d910ea5bb946f0106bba1af3c4d1731c5b99a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    3e9c0df028c989230c7d1bbe547f99fa

    SHA1

    1fa5589601883e027cdd1a374560c6afd0651c12

    SHA256

    2cba365a501ee8c81ce2b8e7db76ccd7be0c2ba30c5f041b950a3c8f0d983d2d

    SHA512

    8a087bd5e55b17a44bbd5cad3c522493326cfbcc64c8324d95963192725eafd4a4b69aba5278879518b47debf435d79294a027bae103c9245eb4b53efa33d06a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    a089d7ff53cbca7c9ea459b9da4b27ca

    SHA1

    2ec6a778e47dd227b8fde0f4caa3dfd0b090abb0

    SHA256

    f6187419a781d07880951f1db21b35a3afa0c58ab02d037bf8f2c771e46f7758

    SHA512

    ced8bbbf7c3989fd618bf5bdbafe248f6a871cf9cfcedb1d0fdad8ea46374d0260d6f8b153cb27d02c17a1db8bc2a7dedc2783af43607f84b50adc0beaa6f71a

  • memory/1040-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1040-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB