Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 22:19

General

  • Target

    54d2a8f69987e3e11641523f2946b79bd3403dda7cd5b4fc2210d03dd1813f11.exe

  • Size

    56KB

  • MD5

    bde497823e875665a814ec64a80ec163

  • SHA1

    511bb90942bed8428cd2d1825698eb6c8e1e365c

  • SHA256

    54d2a8f69987e3e11641523f2946b79bd3403dda7cd5b4fc2210d03dd1813f11

  • SHA512

    4d27807586ab7a0a93aed65b348bed4b7b774f70ca6e670bff71a33a6c549a49666cfb926dabd09263180b68fcf6ab6ec0d3d1bf1d46d832e926b57d7ea13a60

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJb:V7Zf/FAxTWoJJZENTNyoKIKMpS2

Malware Config

Signatures

  • Renames multiple (3786) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\54d2a8f69987e3e11641523f2946b79bd3403dda7cd5b4fc2210d03dd1813f11.exe
    "C:\Users\Admin\AppData\Local\Temp\54d2a8f69987e3e11641523f2946b79bd3403dda7cd5b4fc2210d03dd1813f11.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    8c901a73b308bfe109b8370c188b790f

    SHA1

    9c3ef61ea91be2821785ac12cdd72d1a3bb823b5

    SHA256

    e899abbf8cd96f987ecbc03ac03954577c82b595004a5367ca4162b5b7f5e1f5

    SHA512

    b4580f8da63b454b704f1e9526b136343f1f4aa9f6385b94b2fabed429854c94b954e252c0a12ce5e720606e049b0bd39263e3e3e12b76a6bc0d3177b2b326f2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    7d86e9406cb939cd47b8e77588ab2132

    SHA1

    42082f24177b615f7fe77c2fde4b2f831aa265d6

    SHA256

    e4de193107ccf51ce479f63b5bcaeac54616d4c27f0569091fe7ffcd7cca1d9c

    SHA512

    dc3e25232ac153386a51c1fa0abef54ed022ee91b413252c5966ec30ca81dda69f33ad51dc633c058b7111ac56fdf451cca199a3acbe219bdf98a69ba00d3106

  • memory/2660-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2660-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB