Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 02:46

General

  • Target

    b35b4265423de7d3540b7a6b6ab0a8853c2755199b9f5c75ce8baeb1d25ba5fc.exe

  • Size

    59KB

  • MD5

    6c94bfa295ec06b6b8ca3588bce54686

  • SHA1

    19ee8a80d4fbabf2839d4d9ebcf8f126ae604618

  • SHA256

    b35b4265423de7d3540b7a6b6ab0a8853c2755199b9f5c75ce8baeb1d25ba5fc

  • SHA512

    ce666da3c0dd6a0498a4d08c500a7954d54b80091dbed4a01c43ff436f93bdf20c929d53a1ad63e61e0a47e5bd110d5f123ab361a45aefa0c2e0ae234b86ba65

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiVrw:V7Zf/FAxTWoJJ7TTQoQVrw

Malware Config

Signatures

  • Renames multiple (3453) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b35b4265423de7d3540b7a6b6ab0a8853c2755199b9f5c75ce8baeb1d25ba5fc.exe
    "C:\Users\Admin\AppData\Local\Temp\b35b4265423de7d3540b7a6b6ab0a8853c2755199b9f5c75ce8baeb1d25ba5fc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2120

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

          Filesize

          60KB

          MD5

          f776cc96c7d077ff26060bb5f7ad06ce

          SHA1

          e0976f62cf83562f09783f8e1a0bce8c6fe18ca7

          SHA256

          b9206b7c8327cc713e53d332f548642fbc77a8042f252d821fbd95f7ae450b4f

          SHA512

          bb0e35685e0bf3bc42f7746c58ed8e081ce8da2151d523bd4e47af3d4257c3889cf4f8a4109777497e36934c8fc8b203f2f80b8083ae83ec86538a9d2a46ff97

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          68KB

          MD5

          322b560fedb31f1e48e8d9d2facb8070

          SHA1

          451eed91dc2b7e0a277f7d83816370c42f6b95b6

          SHA256

          53658a6c3433d101cb2ed7f38db8d8931d5c9086ed73e051fca32bdfd2dd4bfb

          SHA512

          bd468b99169281942fa1026127ad2400d56c0a0a465655ddb655a6b34e282c28fa53db0673eb846ceaf07c9e0fc0047c8b419870bd79be5bd413465ab2ddb6a4

        • memory/2120-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2120-62-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB