Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 23:53

General

  • Target

    77dea5284ac0307dc797bc7a0b5648a0fb751b96453387174a620a19621f6e22.exe

  • Size

    50KB

  • MD5

    3cd6bbf1df11615bd01a857c3bd1afb5

  • SHA1

    46e30569e4a3973bbccf16ecd3509f6fdfa8b787

  • SHA256

    77dea5284ac0307dc797bc7a0b5648a0fb751b96453387174a620a19621f6e22

  • SHA512

    68d2c63c70d9df1adec48f2fb887c30bb52336fbbcee6bab22f798911bf6a9583718840c6e142038b406c439cc532852cc0bdc44c3339cd1631bd422532a8967

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9mkLhi:V7Zf/FAxTWoJJ7THhi

Malware Config

Signatures

  • Renames multiple (3461) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\77dea5284ac0307dc797bc7a0b5648a0fb751b96453387174a620a19621f6e22.exe
    "C:\Users\Admin\AppData\Local\Temp\77dea5284ac0307dc797bc7a0b5648a0fb751b96453387174a620a19621f6e22.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    0ace72770ecbd57deceda2e834e4a560

    SHA1

    b0608dfef22418e9356b98fe23b07772453880d8

    SHA256

    6faeb71268b28b1588b308f84d7eaadd81e3aebdf7a5314a7df6fd14b06acc71

    SHA512

    46db8646b85a30b864fa26afcd038d0cdb4759e4aa56f344d5f7f6c3a10c86fb89e82a86bb4e35d75c239df67b653054efb3c5c761e36cb29b3adf9b5ca89f89

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    22e6d358bd44d7ab111106a439db783b

    SHA1

    301a61297979cf4b3b100293846e2bd37986d137

    SHA256

    382389bbb52e8e5c2f20399f3510821510f98ec20d52139e2f4fd59d05773776

    SHA512

    107fd11c6e141a8051f0bf413846300ee9eec95c10c108215193d2104d29441734113d0ba56126fe3e6658ab6114a76061030a994f4da4eaf7caca82eec8734d

  • memory/3032-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3032-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB