Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 00:28

General

  • Target

    a5e294381be15080017bf3fa16def69db125022761975e9aa53f31fd2a2c9687.exe

  • Size

    53KB

  • MD5

    628e8b85d5674912273c3e6f6748c221

  • SHA1

    31d5e4e2cb56aac9f08c89b34bcc31ec8dec62e6

  • SHA256

    a5e294381be15080017bf3fa16def69db125022761975e9aa53f31fd2a2c9687

  • SHA512

    30fc605579eaa6de9c4cb9c15645d6304fae82d5c0b88492e0c8ce1c8b1144de08bfc06c1b0a4adeac78074a6a6d629510fd520fee0d801ef57420b6dd1d3f85

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9wStuStY:V7Zf/FAxTWoJJ7T2StuStY

Malware Config

Signatures

  • Renames multiple (3775) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5e294381be15080017bf3fa16def69db125022761975e9aa53f31fd2a2c9687.exe
    "C:\Users\Admin\AppData\Local\Temp\a5e294381be15080017bf3fa16def69db125022761975e9aa53f31fd2a2c9687.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    8247c9af7aa09b76a040663e1fab7d75

    SHA1

    f34baae73ed73343d587963aeb6f09495e0c9f7d

    SHA256

    b2f1ef1d566cf9baf6da2a7dd3d554ac050845b8f02ef87236300660c4debab1

    SHA512

    9f51e12908c881ecd966f5bbd013c4ffdc23d8ff966e08852c7d39bb492bb1749cbdb5d2b311d554482c25156a42e6e043868657eb8fe6976c8e3d5284bd9104

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    bbd560a3671ce3012729317694c13135

    SHA1

    af6bc2446c878dce3a050875a4f1d255bf24c4e8

    SHA256

    9b98204c1ae547f1db323fd95fbd4cbcb7f7e515d783c4af3fe05a371e7f9868

    SHA512

    411395e9275380612e7807b2fe02eacc4a2e1d044a748776fa6075710f3ee21829bae57cc790d7e21c6cbc6bbb20b5dd6bd113e1e246fa2352e3b1916cbc3178

  • memory/1860-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1860-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB