Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 01:23

General

  • Target

    a7896de3e4fe9a843135677d444a82bbe592d094d4ad2f83da31c2764964623a.exe

  • Size

    92KB

  • MD5

    5dfddc6a4610fd86178c3b199111d232

  • SHA1

    d6e1a213d66f1557f056bd355e158bf66689b0db

  • SHA256

    a7896de3e4fe9a843135677d444a82bbe592d094d4ad2f83da31c2764964623a

  • SHA512

    7c4bedc21f97924c873d47dac53e9b1c294724970204b411573a7129e9bc6da67a06b01322bf0c63a8b87c21a3da6b9324bbc14d3c580304278b262679074c25

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsJOLKc/xJtLJtTGKbq:fnyiQSohsUsUKCG

Malware Config

Signatures

  • Renames multiple (575) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7896de3e4fe9a843135677d444a82bbe592d094d4ad2f83da31c2764964623a.exe
    "C:\Users\Admin\AppData\Local\Temp\a7896de3e4fe9a843135677d444a82bbe592d094d4ad2f83da31c2764964623a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    92KB

    MD5

    01e8514b411856a3d571653e7af52541

    SHA1

    11019e93b4524853bfb2e99de1e578aa4423762b

    SHA256

    4521d8ceb23fbc32fafd42458a1a4b623da751b63b5c6e2a12407c5ec15a0064

    SHA512

    f52c23d07c7c92d7aee83e22d7d2279a8f42c30b82ee31e69e6797d6459bfc777de24b5304df20fd867f10501b6f656b35e819da6b4cf331512e2a51e95c7e66

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    101KB

    MD5

    561e95bb68e7c1efed549f51ce21624f

    SHA1

    165b5bba7cf08a8e8d2159887dae27810c25a694

    SHA256

    934b691a35f72bac942833eeef3057909f7227771b996ec2b3e30565ba51eca4

    SHA512

    a1da6625f380b6a3ded0499662e9deeb83dc0c67c36e35db3d0bd28aecee4ae225aedf19b807bbbc2d89d063f0259fa2076d22a42f93355f392de77a748686f9

  • memory/2984-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2984-18-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB