Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 20:13

General

  • Target

    2171fef7d1d6427a9d710e2e82e485bb3c9f0c098801aca1ae592d2849efc303.exe

  • Size

    48KB

  • MD5

    1c6454eae1b9c041d41332fc9c27de92

  • SHA1

    277388dc0c7b76f2a20dd01467f1b53e1059dc58

  • SHA256

    2171fef7d1d6427a9d710e2e82e485bb3c9f0c098801aca1ae592d2849efc303

  • SHA512

    8079b8ccd9690c9c404611b5bb9391cadba27b56ea99f4221015b61839c150e124e905e01d86272ad85cb54621cac33ac372b3a54922a12ef10457026e8605e0

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI98j:V7Zf/FAxTWoJJ7Ta

Malware Config

Signatures

  • Renames multiple (3785) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2171fef7d1d6427a9d710e2e82e485bb3c9f0c098801aca1ae592d2849efc303.exe
    "C:\Users\Admin\AppData\Local\Temp\2171fef7d1d6427a9d710e2e82e485bb3c9f0c098801aca1ae592d2849efc303.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    546ebedb0a6bb9f42835bb6470458417

    SHA1

    41268c4ca74689d4f504e832f7fbdf9f0c466369

    SHA256

    25b45b8bf1d520095fd31acbf570ee22e05ba895a0c09c621c80a1c302e8ba16

    SHA512

    3b76af73012dfb93ba222877b25919ad0fcaa046ad5c80a2cdbecbd7681208091a15afd9a4f2d9ebf8cace6439bcfcd2266e8ea58ce78e40d9cd7c6e6fd11cb1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    8d6ed4ea9a3edea4553832984a2699b2

    SHA1

    234edb9e82ecd51b8ca46110f29df2a375921496

    SHA256

    629bd361465c1b7aa2c27fba2516a8303baa8e2d0c4f3a4fe9b42c358e56870b

    SHA512

    a8c4c982761564f367e575c0e271ac99f258ceb325c4bfa7e2fc6f403874734aac9e8083ec2f042984212b0cf7e2e0ca6155d98a3d62adbdfeca9c0542c3f2a7

  • memory/2296-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2296-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB