Analysis

  • max time kernel
    119s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 05:20

General

  • Target

    ba34a1c19f0f55ab19d0ff1795abfe90N.exe

  • Size

    58KB

  • MD5

    ba34a1c19f0f55ab19d0ff1795abfe90

  • SHA1

    b52c9a5519026411aa348b25e26e1ac600361fb3

  • SHA256

    0062e0f70864a5ac1158452e64034478783430bc3cd5c04f89ad7d59f9b25f64

  • SHA512

    5020fd8b190bbe5a5e881882396a93a2f18184c6138082468910871a8b6f63b81c73d8b6955121f7a722075e837bd9ebe070472956b47ae89b6a4341662e3ad5

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBApwp133EskmKw:V7Zf/FAxTWoJJZENTBAOIfmKJfmKy

Malware Config

Signatures

  • Renames multiple (3259) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba34a1c19f0f55ab19d0ff1795abfe90N.exe
    "C:\Users\Admin\AppData\Local\Temp\ba34a1c19f0f55ab19d0ff1795abfe90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    0960fe8d98d9329fdd73a3be7a4d57ee

    SHA1

    72e83f1c5bd54a5a4d326ceaafbfe8a6a7f4e649

    SHA256

    ae7015dc0481fefdeb2014298c08e844c8f859a7a0afe96332fe4eabd6112e49

    SHA512

    232f8887ec4e03c126eff7da6a2d05ceaed456226c88ca8a90efdf6eb0641c2f65aa27a8682e9ff07dad9d0de37d68a7833ed76f426c35dc5b94d99f7f0da84f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    67KB

    MD5

    62045f3a22dccd8c96bc3a72ab1896cc

    SHA1

    f642f837253b385d88cea5457ed7ae054d8b5d18

    SHA256

    741b9fbfe843d510666331a8ecdc70d06c1d10e401427e59bd0b020c0be33e3f

    SHA512

    75bb41814340676a484af2630e3e5afc2eb5c66d612008c657f38e0ea6cef78500d5779d98ffe3df83b177c384fb7bfd5202f32bb005cc5a061315ffd3f7fe34

  • memory/2328-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2328-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB