Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 01:21

General

  • Target

    14ae2910a00fdab7b61be8ec8097c63a3349c041940b070604a3d130c3cec4a5.exe

  • Size

    150KB

  • MD5

    9d9d814d4f2c8496860bd8be6b8ef208

  • SHA1

    ed729e6614dfa663976a14d4437bd83e8b295db1

  • SHA256

    14ae2910a00fdab7b61be8ec8097c63a3349c041940b070604a3d130c3cec4a5

  • SHA512

    a519402c57cae9a8b4f0e3c09ac9cee1f7e9be8a32076184f63413ed5b3af13383b525e13b3791b4038d645b9be5950e8e600031dd6b0e6064939d9b81d7c764

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zx4LgL2TWn1++PJHJXA/OsIZfzc3/Q8V:fnyiQSoFcSQSoFcZQw

Malware Config

Signatures

  • Renames multiple (3448) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\14ae2910a00fdab7b61be8ec8097c63a3349c041940b070604a3d130c3cec4a5.exe
    "C:\Users\Admin\AppData\Local\Temp\14ae2910a00fdab7b61be8ec8097c63a3349c041940b070604a3d130c3cec4a5.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    150KB

    MD5

    2ef662be4c4afb49fe74f4774ad06c87

    SHA1

    49ca63437421057134004816a68d5ae774b46263

    SHA256

    793faa287b8be30ff5c0a04b48b9db1dad89bd3f81f5183446d6b479f9d09dc5

    SHA512

    a4c93867bf103887943dbd121374e5b9c290a2ea2aecbdb7131ff2bce8f64e2180afd431e2a750be9e4fa39c76add0ae36b1b01a6a083d1b3e9de0fb4a656f6d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    159KB

    MD5

    a9036d76b82642744665e0e26e3beb7a

    SHA1

    ab91ac2314e4b30321a81a752f0722f5d6cb1e20

    SHA256

    975f71561a95e38e71ae43efebf944e050fe86aaac4b79ddedda6075e8d50770

    SHA512

    3409b805084138694c27711f932175accc61933fcaa2c50b99eedfdbcf63eebf498991764e31f893532285035ca3e052a1fa2e3a1d2091608a6c9a2b314302d9

  • memory/2692-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2692-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB