Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 02:07

General

  • Target

    ad68ecdac3c779901068569b2272c2229bc930673954e3469fa18b5a0f64349e.exe

  • Size

    67KB

  • MD5

    d6e4ff93aac05ff3e1c905ba53d4ae3e

  • SHA1

    c8f8d2cdd2a131219bb1769e2d5def6fb3e54642

  • SHA256

    ad68ecdac3c779901068569b2272c2229bc930673954e3469fa18b5a0f64349e

  • SHA512

    c9d4c3851ed386ca925c9fccc7141503bca4c70de75c201133e916dab25398162b1e85df18712787cfaa087619dcebeb836221c80b40173a192cc2f238c22126

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8IZTkb/b8QY:KQSo7Zgr4QY

Malware Config

Signatures

  • Renames multiple (3830) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad68ecdac3c779901068569b2272c2229bc930673954e3469fa18b5a0f64349e.exe
    "C:\Users\Admin\AppData\Local\Temp\ad68ecdac3c779901068569b2272c2229bc930673954e3469fa18b5a0f64349e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    67KB

    MD5

    5e9bf832d4b417344085f4b8e5fa7ace

    SHA1

    715717677dc12236d1c660a1198eaca30136ba34

    SHA256

    2ee040fb558d9a78129c8c78a48e6450780d6716280453f5811b09c35012d2fe

    SHA512

    fef3a237b8eb541216b3d5514225aa9ad8b2e100aef8f149415a6a01ceb2f81a25f1d151a42808f2f31a05ede5b305bfc38fa1622152e98b1646c48bebe5331d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    76KB

    MD5

    54fff0406b24f1e9896d17e0c5af727f

    SHA1

    baa76d0a1c07d4f88eb66151ac20e0214da88850

    SHA256

    fb0f3a1a7f87a58b70f74cefe0ba6af215856827690eeda6ac95d44b0604d8e2

    SHA512

    ab13812ec3451fc4c0b580762cbcbea32a01bbce0886ac6e3206df652f86c3144d61450bbb0cdaa4cd27e2124f1f88aeea4708a776a8d220cb825d3ac56c6894

  • memory/2264-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2264-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB