Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 01:00

General

  • Target

    b5bf4d51d3c605d19def296073c4816bb5185e37c396d5269157347c4477e6d0.exe

  • Size

    41KB

  • MD5

    84d27a2fdd5af86ddb930eea28d85f9a

  • SHA1

    90f5fcad8e82af1d32299faee6903eb95bd321ea

  • SHA256

    b5bf4d51d3c605d19def296073c4816bb5185e37c396d5269157347c4477e6d0

  • SHA512

    b00c8763fc88284585980f0c44073d1967d6d668b9cceefca6da76978c794ed7b2081c0519c6117ff79a889e987fd0af93efd3fd284af3b43f02b532a9e0e745

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0m+s2BGUGEgZg0hI44ec:CTW7JJZENTNyl2Sm0mKRgZg0C44enYE0

Malware Config

Signatures

  • Renames multiple (3767) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5bf4d51d3c605d19def296073c4816bb5185e37c396d5269157347c4477e6d0.exe
    "C:\Users\Admin\AppData\Local\Temp\b5bf4d51d3c605d19def296073c4816bb5185e37c396d5269157347c4477e6d0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    ba476fecf41175ebeb20b16bf344fb88

    SHA1

    89d540eae657ad76b3ca4eb0b036e0f5f48044e1

    SHA256

    dccf006c1a0d4f363897f039f35322a80e6da9975f395bb6779f2fbecdf58121

    SHA512

    1054412f6f04250ed84118b511fe5ce1f57269bf62422349ac11c3ef17bdb4c195eacdb953a6844854b5ef51ac761cb52fde3f44c46079b169dbeb0104bf1627

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    2c3185937ad17dee78c3f10b63cfe7e1

    SHA1

    40be3f8872f19ac2f9086f51b7572156244cc9a1

    SHA256

    1295121a71105afa5e9b1ce915ebb0205540ac07519f95fba80e753b40871cb5

    SHA512

    018cf0c34678748ef27aaede61da0a35fa57230776bd597d0622973e4f40e648a70391c0ebfb649df0d384bd87008f003f5341850e5d4353388090227d79b710

  • memory/2792-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2792-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB