Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 22:20

General

  • Target

    62b3e97d529ee4cb0fad63becab15fc7fc94bc7dbe3d21b948a7d0858c45deb3.exe

  • Size

    31KB

  • MD5

    5b475ccf881bb48b6fc065c3c1599877

  • SHA1

    9d4abc453594ed37123074539db25d1c72a526dd

  • SHA256

    62b3e97d529ee4cb0fad63becab15fc7fc94bc7dbe3d21b948a7d0858c45deb3

  • SHA512

    cece0c6beaebe8cb01ea05301f98b93998aa15495b4f24c1613188e8d9582d1c78c05df7bb0a7338360dc339e94d3ae07a063c03501abfda7515bf371ede838c

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9uGeoGeU6Y:CTW7JJ7TkGeoGeU6Y

Malware Config

Signatures

  • Renames multiple (3872) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\62b3e97d529ee4cb0fad63becab15fc7fc94bc7dbe3d21b948a7d0858c45deb3.exe
    "C:\Users\Admin\AppData\Local\Temp\62b3e97d529ee4cb0fad63becab15fc7fc94bc7dbe3d21b948a7d0858c45deb3.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    32KB

    MD5

    b8d34339c3d7169ebb68926593faaee5

    SHA1

    8a907ea4b8d0005021d91f196bdddd7909ed50d2

    SHA256

    6ec93ec7ef141cc9b8d28fbc0e3e8ab769799891c2ce62c0b7db1a4ff9f23036

    SHA512

    ec7b1a289efe1d67583987b0eb177a5c1422f9caee958f09ccd00e161b3c0e447a244abffaea7844c5e5a5c0d9e5127af212b7f8b124522fea884a2cf8f20e37

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    40KB

    MD5

    592efdd0554bb5b0332648e8ae823692

    SHA1

    f60162a08ea97bd5a832ef89d27b46dd91e6cacc

    SHA256

    8119074e49b549dfb7f810d2bfeb0f7d3335fafcf0cc986921783e154ddce9de

    SHA512

    f4d8ce1d76443c673310eed2bb2018266630c633ea0621a1c4be85016f03ecd21499c8d8eb8b73e9c89e7d046776da16bd9cb336b8d423d93448deb194fb1a0f

  • memory/2112-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2112-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB