Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 03:13

General

  • Target

    d1e5f73a8752425bbdaff94952e0fb0b484db9fe9aec01a85b6d377b1825c07d.exe

  • Size

    27KB

  • MD5

    2e4ef1ab8318762205d152e1179d8622

  • SHA1

    e7432ac530ca072a0d9df6933b460975854ab363

  • SHA256

    d1e5f73a8752425bbdaff94952e0fb0b484db9fe9aec01a85b6d377b1825c07d

  • SHA512

    28f3dff7dcc1e0ae3eea6b93b27a68b57d253783af634d7e7a0a0735b57f59584f6c49614fc61054679fede9ff60022b3f75b66b4bb25e9b783d925e5e945a47

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9vND:kBT37CPKKdJJ1EXBwzEXBwdcMcI91

Malware Config

Signatures

  • Renames multiple (3682) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1e5f73a8752425bbdaff94952e0fb0b484db9fe9aec01a85b6d377b1825c07d.exe
    "C:\Users\Admin\AppData\Local\Temp\d1e5f73a8752425bbdaff94952e0fb0b484db9fe9aec01a85b6d377b1825c07d.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    27KB

    MD5

    38e2b9b8cd5f8e090dc6d1db096bd52f

    SHA1

    5d62ce2d4ba934e467bcbe5ac08cc16d0c696ffb

    SHA256

    f83e4674adb1d9f7e5e53b2d166f4082733e85283da2867437af129e971cf862

    SHA512

    003ae01c07bd7668e771cb52c15f6c52aa4f526d3ab1e00d2615e0dcbd669c7495d0713e67c0dc7c48d0e3b278ed333390649b1e6780aec24a433cb2256c69e2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    36KB

    MD5

    cf8d8333edc700d17c5672543999a91e

    SHA1

    cd9ad0252f5a7a5a5b26f377b63888137cbd151a

    SHA256

    8a24feca4030a626270098e671fc36e00484c82197f21c98484bd72518f46718

    SHA512

    cca8871438ac90ce6dfc3a5bae0fc91775febaf974de570b88c62b5b28c1dc80c5b23078edde654e4276c2a0e1b64fae2c68dc90862597205880ee71fe4707f2

  • memory/1064-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1064-69-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB