Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 23:36

General

  • Target

    795cd15f3d62cdcb45a2c81f32a8a2625560d03be8ba6fd243e6d4bc9d8f6ff0.exe

  • Size

    65KB

  • MD5

    8b8b0ad3368180113e8be3ab7bf00db1

  • SHA1

    eafd15fb8cfed45b808538e42978bf1c2c041531

  • SHA256

    795cd15f3d62cdcb45a2c81f32a8a2625560d03be8ba6fd243e6d4bc9d8f6ff0

  • SHA512

    c2ae1469da0668afe5467df19b03c0de987a02b6b942bbf5c8755dfff9e37070cefcbfaaebc226210968e71cb43fc3fc5f960efcbfb35dc058b443a486607b12

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiA:V7Zf/FAxTWoJJ7TTQoQA

Malware Config

Signatures

  • Renames multiple (3721) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\795cd15f3d62cdcb45a2c81f32a8a2625560d03be8ba6fd243e6d4bc9d8f6ff0.exe
    "C:\Users\Admin\AppData\Local\Temp\795cd15f3d62cdcb45a2c81f32a8a2625560d03be8ba6fd243e6d4bc9d8f6ff0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2376

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

          Filesize

          66KB

          MD5

          a9cceea515dba01859471b5d02c9e100

          SHA1

          d3a74bdc966b4f4b9fc4440fade94d8d4baa38f8

          SHA256

          2178cfaa65e4ef5b122d6894e7e250eeffe4fbe011c56d31b5a17adcc5b61726

          SHA512

          56b27637de1f56422ced7b3f2d1fa5a5506462d6d9566a31cf6fce73a1165660211269aef64806cd2814d247076821739b376dcf51ba823434d234a02acf2e81

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          75KB

          MD5

          bd8fb2930075f3297447ca21786eb364

          SHA1

          83915aea588361d24244d6f7d7c2982dac2a1abf

          SHA256

          37d1db9f1dc8bdf2f4e3b0a93c1cd27c39682de04280d115b23bc638819f3ef1

          SHA512

          084d23ca31845c0f658b968a40fc947447e7bfdfa1868f035850e9c823f78206f44042477bb2ece4380bb36cb2bd558df8e27b5f3eaf3e79dc1369370b33024d

        • memory/2376-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2376-74-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB