Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:55

General

  • Target

    e50c5588c9f78c38d326a32badc38cdb92d02ee86ff9aa9ca76c8662f339a019.exe

  • Size

    97KB

  • MD5

    3d2ec3652d96089b017b17c4c9d838aa

  • SHA1

    916ba6a565b60885f97412ed7ea0e21aba906873

  • SHA256

    e50c5588c9f78c38d326a32badc38cdb92d02ee86ff9aa9ca76c8662f339a019

  • SHA512

    2382170ef2ba1dcb331ca2810a859b9a7a615a4da523484a2bf8139fc51ea7fe8c7c33218c5093b1046ba3e83950a410fe80683b0f2b27d28d874d50f15ab765

  • SSDEEP

    3072:fnyiQSodYeHNmkDxfIyKoIWbsHfySkT5GeCyi348oWGRPOzkjId6q8UdrSD+kCoS:KiQSodYeHNmN

Malware Config

Signatures

  • Renames multiple (3511) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e50c5588c9f78c38d326a32badc38cdb92d02ee86ff9aa9ca76c8662f339a019.exe
    "C:\Users\Admin\AppData\Local\Temp\e50c5588c9f78c38d326a32badc38cdb92d02ee86ff9aa9ca76c8662f339a019.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    97KB

    MD5

    e95f855a0dfc06e6b94b19a3df899093

    SHA1

    42ed8f345ec1659d4211aa2c89100e129dc9320b

    SHA256

    9f4214e85b96f3c6f9ee192e84902028ce859d844c3e93490a179adac6578bbe

    SHA512

    ef22f769ee723f0b0e069af328b49b3ca6f4a006114dffdb02f4a687cb6fb1e5e30715764163579f62f3bb3a6c29fe5b83648117b3b9c603e7669670869c7b94

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    106KB

    MD5

    138b872ad0f195a8363b4f7b376b24bd

    SHA1

    d8d1d1b92808693db9c4a99e00dbe5543949b1a5

    SHA256

    8d03a6f116e8654c75bf6b261db5f163dfda416d4a0cd440777b9a1dafc3aee4

    SHA512

    24eac84f60b7791349155cff0ff7d85912fe6cd4508e6c55291157dad5d184580bfc2dca991af5a22880ae04fc2b129381e9b39d1c5e3a79924e985db74062b1

  • memory/2964-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2964-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB