Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 02:49

General

  • Target

    b42b0621f8123aca9b9430ba501de1d1074346788a95c9f270ec7db63cc5e75f.exe

  • Size

    120KB

  • MD5

    0264d9648f481055329e2f4d99e68e7a

  • SHA1

    333fe3620b0335c8a796d9e5bc0d50b8e8325dd1

  • SHA256

    b42b0621f8123aca9b9430ba501de1d1074346788a95c9f270ec7db63cc5e75f

  • SHA512

    5bcea47bfe0cf2a666f75e6f71942d553e338f73b8f272fcc31e995f674f5f20b9f3f2ceb829bc5ea3f80844d781704e3673345c63634ee58934c6c308504bad

  • SSDEEP

    1536:V7Zf/FAxTWgGpG8n2ryruqjTWJGpG8n2ryruqo:fnyKp3nAqXp3nAqo

Malware Config

Signatures

  • Renames multiple (3476) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b42b0621f8123aca9b9430ba501de1d1074346788a95c9f270ec7db63cc5e75f.exe
    "C:\Users\Admin\AppData\Local\Temp\b42b0621f8123aca9b9430ba501de1d1074346788a95c9f270ec7db63cc5e75f.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    120KB

    MD5

    9a8674775c6efad78a061df95256b5ab

    SHA1

    3065f033b096bfef9d60bdb942d5e0f6e7552a16

    SHA256

    d851eacb7140105dae964f112b84c1c60b3d48731716ccd09c1c2c70417b1a8c

    SHA512

    ad4a87b1f9f44b5b8176765fddaa094389d2f0604f3fe5bf7e30aef6417e400b3e449a9fd0a0ad8ad142ae836d32101354b769fff39b20ede3d1b9deca5c227f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    129KB

    MD5

    6a2150519b860926208931e6d25ae0d4

    SHA1

    4578cb42272aed29a1e81e63442ebb180ba8aeb5

    SHA256

    947d85448eb030d52953d3d99faec6a1feb695437007343c4cda22cdb15c1beb

    SHA512

    b9c032ac2405bbe81686b53bce0b69ae88237733015b055f91da1d07c1524edcd04181048bbc2c8b9fd4b248d36d7fb8355555211c04f93dbd2b053634d3a4d8

  • memory/3000-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3000-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB