Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 09:13

General

  • Target

    a58d706891941f4c36366c7e78965cb0N.exe

  • Size

    59KB

  • MD5

    a58d706891941f4c36366c7e78965cb0

  • SHA1

    7ef53e70786e51837a2a616ee0b9745f9a177b4e

  • SHA256

    bdc38bdeb6d9708a69ac1e241d1fc41a3f6d17fb59d77e29372825132f0a9171

  • SHA512

    1571d3cf8c20faf057fd04d0eecce23d7971e53c09861457630d2df8501ce8da9bd8b2410d8be2c0aaf65762253cf7116879ae97c7bc4a8550931b311aaccb94

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tirZSZ9:V7Zf/FAxTWoJJ7TTQoQ2

Malware Config

Signatures

  • Renames multiple (3139) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a58d706891941f4c36366c7e78965cb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a58d706891941f4c36366c7e78965cb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    59KB

    MD5

    c5ba460b0978952583580d6314103b40

    SHA1

    9052a0bb64ef4c6d3ee3b23a149a943e183432c1

    SHA256

    20bcdacf379c4af797f16f3a25a45cc1268baceaa9d7981e033da9edda2e67c3

    SHA512

    c777bd7b008d5195cc3d58919048f9199420dd92632c4df0b24d469a2fec6381947e12ad517e64f3865805bbf5fa9756f2ecb652799754887cf78d3bfd64dc50

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    68KB

    MD5

    c00a7e4588f922dbca247b1ddca9c2f5

    SHA1

    58e5aeb7edbd493412f89d86fb571b84ebc0c1fa

    SHA256

    62c940fd4b50fc9a15ba2530b81f22a741b47da02a3bbc3857527cda62e7b36f

    SHA512

    7b82df52cb4b21be6b90e451e6924fd08d4287969a6b5d631937d7dc763b0961e7d96a8e27080a1d4787b0d9a2d765b735f40f4f6da178cb10051f752a072153

  • memory/2408-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2408-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB