Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2024, 22:40

General

  • Target

    204a2ec370ef7eb5d787d31758c571ec444a20a587b7fcc557c6771bc4cde208.exe

  • Size

    94KB

  • MD5

    8a69a22dd6624e13483ce8ef22b5db27

  • SHA1

    9eddff37d10b325e6ce26612153ac6f3bc596be6

  • SHA256

    204a2ec370ef7eb5d787d31758c571ec444a20a587b7fcc557c6771bc4cde208

  • SHA512

    043bdf18148b8c8b24c5c9afab28e84cca2601a6f780ba3ae3dd4d5341a255ddddd6c272480aae55f091ec6c8dad05c3392baa1ab04d8f31e8ce302c9ec85df5

  • SSDEEP

    1536:V7Zf/FAxTWoJJTU3UytJfO5mdGwmdGATW7JJTU3UytJfO5mdGwmdGFfx:fny1Q0

Malware Config

Signatures

  • Renames multiple (3433) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\204a2ec370ef7eb5d787d31758c571ec444a20a587b7fcc557c6771bc4cde208.exe
    "C:\Users\Admin\AppData\Local\Temp\204a2ec370ef7eb5d787d31758c571ec444a20a587b7fcc557c6771bc4cde208.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1752

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

          Filesize

          94KB

          MD5

          ceb39ed4c32de5ac19abc989a162fb94

          SHA1

          eedd13d1dc675acca0f7b7f2bad3aa77a428d01d

          SHA256

          78c20dae1a3956f456d524124f3610f46dc89632c70c252907f8a3a52306fb55

          SHA512

          9f5ab4f00bc0d6560540d96a7285f5b365caf212bdf3a9464d8531016bad9278ad8141bcdb8e5986e0e16cc2662c772f011aa32a1b7f6a81f50d284881096126

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          103KB

          MD5

          71b7d274cc6ff96d4f55fc827df9ef0d

          SHA1

          23da67793b3da9025084f7abfce630ca414d2cae

          SHA256

          169006c440feef8bc284aa11b285d74750859c5c128b64a8ce953bb731fbb528

          SHA512

          065ba80437b0a2b4f506c007ab888b6edf47d935e0e5ccdf8b70638baa72cde4dca4ae213fbe10d46202f016fa4292510b5478304c212e8ecaa854b2f7399f3b

        • memory/1752-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1752-70-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB