Analysis

  • max time kernel
    147s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 01:53

General

  • Target

    31be9a01c6da5324b9900959c1e2d951f1f1dbab7417836c40f38f163ef89ac7.exe

  • Size

    66KB

  • MD5

    8ff6a17f4a0358d15d8cf473f732e141

  • SHA1

    ba17bd835752cf291a3c371c84ed8a3f69bed55c

  • SHA256

    31be9a01c6da5324b9900959c1e2d951f1f1dbab7417836c40f38f163ef89ac7

  • SHA512

    9a32c37d2f1f18c4083330109d4f64091fc62fae1bdd747512c1be43e075dfdbb2bf7fe653a11d4c8170604bd0e9422cfa572281e7744e6db1c4e23f51061ee4

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyl2Sm0mKuC1TC1q:fny1tE42Ej

Malware Config

Signatures

  • Renames multiple (3564) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\31be9a01c6da5324b9900959c1e2d951f1f1dbab7417836c40f38f163ef89ac7.exe
    "C:\Users\Admin\AppData\Local\Temp\31be9a01c6da5324b9900959c1e2d951f1f1dbab7417836c40f38f163ef89ac7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    66KB

    MD5

    5b025f24a74aa38574ce82e69858418e

    SHA1

    6bbeb9f12eca848f0370c611b5b0dad2eff12c52

    SHA256

    5b27db089f11d6a25be278b9d16639f1c1efe19363619bafc83b1bc40e6b7d0d

    SHA512

    ce84cf4ddbb69ef05234d13f6820070e32f91db2a82beb0e1445819dead756b7ff86d776e0431c5257126dd4f05711a44d56aed60f47efd735d27903a170bd31

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    75KB

    MD5

    c3588fe80d29dd7be59fe9690e669e63

    SHA1

    14c5384828729535b02723e624b72a59797bb33d

    SHA256

    b3c550b6cab7227f08979cc0cb6026e59ae5a54811cf89b2553336b58a3cd098

    SHA512

    93d16e2c74d1e4342eceb19265857135c7530f106108ea7f1a31df953a17ae5f9df660ff30e5019bd4c93237410eb529e8af011e9bab43ba82b8683993df7e58

  • memory/2096-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2096-64-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB