Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 02:23

General

  • Target

    4a57ebe72950328367e4a7a96fb7be6489bb9ad4ce41a551c0fb04defbed0143.exe

  • Size

    32KB

  • MD5

    235a8e79ec275108f39af14c76bc7f75

  • SHA1

    6256b4fa6b1a7b5bd1c17232734f378ec708a464

  • SHA256

    4a57ebe72950328367e4a7a96fb7be6489bb9ad4ce41a551c0fb04defbed0143

  • SHA512

    68074b3fce0eff6d9a9bb9dcabad7e5411ff4f0c87d779023a225dfcf4b5ee9b274c6ae8b950975b801d703b28ace4f580863bad8b6fcf65283bfe4cf9176910

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJ59ADJsmrPlHlB:CTW7JJZENTNyoKIKMmrP1T

Malware Config

Signatures

  • Renames multiple (3832) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a57ebe72950328367e4a7a96fb7be6489bb9ad4ce41a551c0fb04defbed0143.exe
    "C:\Users\Admin\AppData\Local\Temp\4a57ebe72950328367e4a7a96fb7be6489bb9ad4ce41a551c0fb04defbed0143.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    7e0e4b1ebb4db9298105b68306d8be97

    SHA1

    cc9e27a4ee22e997577db3e7cf7fabca7e697620

    SHA256

    c1c0df99a811c4861adc135b268130e7c692806661adb6d406b32c0b1b26e1ea

    SHA512

    011f3ce01ed37b46d7827231d436aaa6aa4b43c228f58b334edd19c8b42dba4dfa65a25a912663fcb1a0038d61059d0fd3e7ec9841d72dc323ff829aa80f24aa

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    42KB

    MD5

    b6174ac752d887bbfacd2c084ed48e00

    SHA1

    d16f8ec381a167c982650f24a7695df32cdc94f2

    SHA256

    1006748895cf22ebd02e87dd939c8d454ce48a8b6929303e0486395a9948c22f

    SHA512

    70444d55f221b88b434a4ec7b323f1f8bd00b43af3397886d6d73bbd5f9a95e28554c5f9c9c968811dd8c433f5d9f9b5383ebe18f3dd2901c65dd57c93d47d73

  • memory/2332-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2332-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB