Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 02:08

General

  • Target

    b942258666cd0bed4b1e41a2a8dfe46f3cd2c848502ed768d06774241cace362.exe

  • Size

    78KB

  • MD5

    1ca09f37f8aada1dd31250c76851433b

  • SHA1

    aaa8adcc00b8b6a12e954af97e07084e37b84ef9

  • SHA256

    b942258666cd0bed4b1e41a2a8dfe46f3cd2c848502ed768d06774241cace362

  • SHA512

    d29cb5b7917712666797e661e6cfd64edfd25adea233834b5c6bce4c0d94390854cbdd280d9dd7ab6fd1a2e7e0aff04cc1d3a285f79df274b31b90180eb500f2

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8asUsJOLKc/xJtLJtTGk:KQSohsUsUKc

Malware Config

Signatures

  • Renames multiple (3521) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b942258666cd0bed4b1e41a2a8dfe46f3cd2c848502ed768d06774241cace362.exe
    "C:\Users\Admin\AppData\Local\Temp\b942258666cd0bed4b1e41a2a8dfe46f3cd2c848502ed768d06774241cace362.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2156

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

          Filesize

          79KB

          MD5

          6967665d597a838aff0780dcdbdc4170

          SHA1

          0a157eb8c655546aa643e3e2a7c5eebe85619787

          SHA256

          5c586cf9b446b357a5b95df92a525855b7246376a23fb6c2470879cb5c4b0812

          SHA512

          f20a0fcbc7e3beb276f062d96be313e2d480ae321b4c57c10355767a117184f90256d1fe1f4db4e099f12ea243350cf127961b5ef9ea521dad155bbb2880aee6

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          87KB

          MD5

          41cea6d660bf89925ef29bc5615c37d2

          SHA1

          48eff4264695e730aa246b9afc1a28d388f13b20

          SHA256

          948ca2070f0049a4fb2f029fbb3a0f181400980cc610a37e991b7a392ae73036

          SHA512

          945b0498d80bead538c18c8c1573a1e8e9aef2ecbe1c515e94dd0a8277597ca2dde9d8d20fa8ca6ea53bbfbcd995573157e98d103976b141db2085c2867fa76b

        • memory/2156-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2156-74-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB