Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 09:00

General

  • Target

    a035c2aa6fd09d7940d4e87a8b0f9dd07aa956c76619f6f1f5b53bb647a9da71.exe

  • Size

    39KB

  • MD5

    b2993db5ac040b738b51ed65d13d2423

  • SHA1

    48ee199a61c8b0405629c5da6c99bbec6f82cc80

  • SHA256

    a035c2aa6fd09d7940d4e87a8b0f9dd07aa956c76619f6f1f5b53bb647a9da71

  • SHA512

    47afa22ad0bbd482a70cd49fca03498de83bbb8f899172cf202367b6f4ea84ef684f3bb6476a7ee314f5ec85b13206df1b2c4b2dabc4c485ddefed9e540d9bb1

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATBApwp2ZgZ7maPwr0Pwrs:CTW7JJZENTBAOUY7m+wcwI

Malware Config

Signatures

  • Renames multiple (4081) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a035c2aa6fd09d7940d4e87a8b0f9dd07aa956c76619f6f1f5b53bb647a9da71.exe
    "C:\Users\Admin\AppData\Local\Temp\a035c2aa6fd09d7940d4e87a8b0f9dd07aa956c76619f6f1f5b53bb647a9da71.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2380

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

          Filesize

          39KB

          MD5

          d26949bf1c5f2601dbcbd1101a1ab908

          SHA1

          355c3e7a89fe1feb4a035b84cc1c13b39c835b79

          SHA256

          20bbc5f35825dc13e1aaef236bf5922b4c0f6c9dbcb48f2cde0ecbdddc1b320b

          SHA512

          91638bfa3022d84cb3d9954f26aaccecc987c7e81eef22b6f22dea56c95d2890ac61e88de3ced4121c7121b32f941701c2d04a2224054ed9beb7a5d26ef85c9e

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          48KB

          MD5

          3afd9ac8affd444e3342c9432b7f2b36

          SHA1

          2585eb41ff10a99137f1a52c229d82b2f1da6cf6

          SHA256

          dcf4b4c52c47354c05c2d75505650637fab39cc3199290c7584f4c35ddf10309

          SHA512

          95ff4ee752ea83161c07d93cd0802be97e5966140a4e3c4eef58d3aa9c2f9426f36a1dccc5cda3f1194f19bb0d3fd06595a109305131d1f7b493439eb2d983fe

        • memory/2380-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2380-71-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB