Analysis

  • max time kernel
    150s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 00:29

General

  • Target

    8d5e57f7c0dc2e319c39f860275c64b81365c4f0adf67acc01abb02b03cd5164.exe

  • Size

    46KB

  • MD5

    108467a588118998f14cddf26373d3a9

  • SHA1

    ea3114410966039e1eb9ab070b00eed64a460909

  • SHA256

    8d5e57f7c0dc2e319c39f860275c64b81365c4f0adf67acc01abb02b03cd5164

  • SHA512

    6767dc7b426b1acbbe074f94af27f4ba6eb37ef9b0a6ff7a61ec83cf7fb40dab1e804ccee428541d1adfe1f31acf5e9505e2d4f919781dc0f15e6d76d6839f52

  • SSDEEP

    768:kBT37CPKKdJJBZBZaOAOIB3jM2jMO/7OSbo5+Oi6Jfo5+Oi6JvEXBwzEXBwkqA7a:CTW7JJB7LD2I2IbSq+12i

Malware Config

Signatures

  • Renames multiple (3767) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d5e57f7c0dc2e319c39f860275c64b81365c4f0adf67acc01abb02b03cd5164.exe
    "C:\Users\Admin\AppData\Local\Temp\8d5e57f7c0dc2e319c39f860275c64b81365c4f0adf67acc01abb02b03cd5164.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1432

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

          Filesize

          46KB

          MD5

          041a8be54d075f20edd7183c84c41eea

          SHA1

          6c4a28c55a1b3b9a11974502653f4a69e3762180

          SHA256

          3c2d1b81c73a8caf214cdf3a19e8500c2dbae617473f7a8f288746f98187d526

          SHA512

          e5dc506b57a9df15986761145c9d87f4f5fc514cf2efc2414ac5e799632d60856b3f58b6db7734a3582217bc78fac71c3bd641211ed9000aa3b7a5aad0e6fa67

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          55KB

          MD5

          f541cc6b82d14af6d859279d5197f52d

          SHA1

          e0a219659a65a59b82df7ee12e906200c3f52634

          SHA256

          d50015fdd0341b25b1b71e8b93898eb845fd9db99f39debf3769e6cb17b99251

          SHA512

          709d18706ffb38603d9fc5526bc8391fefdcf570708ab6a42ebb0968e3c238f2a72eaace8c5ac5afb1a9ead12df0dfc5848463301b602cb5d55851f5f61b1c07

        • memory/1432-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1432-70-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB