Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 01:19

General

  • Target

    bd1fcdca2ede844ce4d72c324107c1619e0864fbb8ab2169ea03a24a78831d06.exe

  • Size

    504KB

  • MD5

    2af4d594489407714532ef1e624a96d0

  • SHA1

    929b01525740601d532af84ca5d8687bd9cba2e9

  • SHA256

    bd1fcdca2ede844ce4d72c324107c1619e0864fbb8ab2169ea03a24a78831d06

  • SHA512

    cde4b646d386ca47ff83313d7c66de137292a73541f3c303a4a59fa9890cb34953857de79c456495368e0ee02e6c86766fdc582bfb9672fa96f5ab3973eb8fa8

  • SSDEEP

    6144:KGnLtZHb6Ll5dt4VNCHW1DO7MuL6ISOKQ2:Tnh5gl6ZDovVEL

Malware Config

Signatures

  • Renames multiple (1980) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd1fcdca2ede844ce4d72c324107c1619e0864fbb8ab2169ea03a24a78831d06.exe
    "C:\Users\Admin\AppData\Local\Temp\bd1fcdca2ede844ce4d72c324107c1619e0864fbb8ab2169ea03a24a78831d06.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    505KB

    MD5

    8ffe33632bbac81c36cc7795246f9485

    SHA1

    e6913eebccb6a69614a3dd455264d0b5291dc1a5

    SHA256

    dce2a6d7de53d9cf2b0c0a723be09b8f0d40aa0309d7755a31db64cadd4a9b00

    SHA512

    e0430734326071b633b5790f1a7c27938048a3cad17b5ae97beac9f5089c634a2b6efcb8bd8d9398b18505c2acb1c4b0684ba89c312064235ecdd698a09de9ba

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    514KB

    MD5

    d6cac568bbedb069412809a944a2b9fe

    SHA1

    3c0de6f069c79e8da8996013f0493303fffdd111

    SHA256

    09e6a1c9dfc57a0c0f6fde867273bc3260268c08e0d096e83296a885c7022ca4

    SHA512

    4f058776cb8c6f5146d51c167fa2c84048565e080989860ff141cc7fb1c1143116ddc9dfbc5224e05409365b2a3900ac9630f7be77f0cfab24005292b73c9063

  • memory/2552-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2552-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB