Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 01:04

General

  • Target

    b826c222410d86329932e662112c16c005906e229c9a653c9771f77a1654c40b.exe

  • Size

    122KB

  • MD5

    1af35ac79bdea31f656ac501f77cea5c

  • SHA1

    fc584a6633d3af6c3b81b64930e4ed22da85ec30

  • SHA256

    b826c222410d86329932e662112c16c005906e229c9a653c9771f77a1654c40b

  • SHA512

    a85e09b5544ac9acbea44e56b2e602e67d32a91405d6b69a7bf3c56ac5c8e9b8acd4a21937e3c6ec563e0cf03a33f543a53657292fd838c62d6cbc497bd3bf80

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBTYxSmgzbHhfr67iKiywtzA8YJkZGKDwa:fny1tENzbBfrVdLtzA8YuZGm

Malware Config

Signatures

  • Renames multiple (3450) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b826c222410d86329932e662112c16c005906e229c9a653c9771f77a1654c40b.exe
    "C:\Users\Admin\AppData\Local\Temp\b826c222410d86329932e662112c16c005906e229c9a653c9771f77a1654c40b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    122KB

    MD5

    933545c50c175bafc75e76b89507bd0d

    SHA1

    315fd7ea069397b627942f1fd7d03b24e69bf1b2

    SHA256

    426115df115e7f5bd3e23638341b0e36c517c4c0f79dd0e6cd8b9f7ec4bbb928

    SHA512

    0768840df0b8ba1b9b1a427b40e3222269b8d6e4a19629b745f2ff639aaed8c042212f89bc23482b1140cb39d5da1e6d6f2a761a044b92458ad0455c04c94498

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    131KB

    MD5

    b3deeec732fc97e2918906f9ea664885

    SHA1

    685cd77b001359c1f8eaafb112cc89d6911c4c91

    SHA256

    b53d5d4fcabeb7c8ca8d931afe2897714de3928196231c7418dde3fdbd0aff6c

    SHA512

    4dd0ea2d6c3213a182021af00a9461240df2b6874f0d96dab7db4c7324bf64559d8daa90939589ebdf02e8299d5c7ad719c3aad2091946bbcb5f84c96c75298c

  • memory/2684-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2684-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB