Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 04:06

General

  • Target

    b93273c3aa8b3a779fe53baf1edbfa35d6aebf23c28a787219d364eaa33f3abe.exe

  • Size

    81KB

  • MD5

    3837c74ecdcdca54d182b17aa48a0d19

  • SHA1

    a655eb7b01e4454dc356cc03a3f3161b1e3246e0

  • SHA256

    b93273c3aa8b3a779fe53baf1edbfa35d6aebf23c28a787219d364eaa33f3abe

  • SHA512

    8e954c90aec62be35cd7b9cdd749e8a3c4c1b626f2e16e6fb00e19e0c8720beab922ba9fef501ed634e07d3b84e9ade821e9dac78dc0f07ada8c1977a2bddb83

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9B6r7BT37CPKKdJJ1EXB2:V7Zf/FAxTWoJJ7TOtTW7JJ7TOF+C+r

Malware Config

Signatures

  • Renames multiple (3440) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b93273c3aa8b3a779fe53baf1edbfa35d6aebf23c28a787219d364eaa33f3abe.exe
    "C:\Users\Admin\AppData\Local\Temp\b93273c3aa8b3a779fe53baf1edbfa35d6aebf23c28a787219d364eaa33f3abe.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    f6e5843e3cb6dd1ff53f660ff1905c14

    SHA1

    12bf156c8cb0f0f4550b1b41b119085b59cc6100

    SHA256

    dab58a73c688d0c378e0a2645886a1c1f6d73804bb5bf524f9085e028d984fbf

    SHA512

    9100965d7d65d63c448494e86743973500269861d13cb6fa2f85e5eeeaa7ef52554ae103412b0c430620c16ff302ad7c3f746e94cdf1201bc634a19090ff8f92

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    90KB

    MD5

    fea91013fda14c22f27a84d7e77a6d82

    SHA1

    88da366c21ef0d3fd1282f44b7f11a1c4ef8278d

    SHA256

    f7aad11b7e29dd7dd6b4c32d346728ddfcc6fdd3cadc48d9dcfd4ceec4b1ec3e

    SHA512

    92a5dcae13a66d6a60500e051cdd6d79f9ed27bf406b3fc241329b7eb1ef1ce67a831311db5eb77171c8c54acd1c4e1b1b7dda922d9a89c674ad97e2e357b7cf

  • memory/1868-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1868-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB