Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:56

General

  • Target

    e636d5e5fb6d62b7dce5bde6a6076ec000504e43ff9a577a58917efb13f389ab.exe

  • Size

    24KB

  • MD5

    70d56fd1d4dc1921869af0faec886c20

  • SHA1

    77913c2048aba8001d56ca586be4a47194c4df7d

  • SHA256

    e636d5e5fb6d62b7dce5bde6a6076ec000504e43ff9a577a58917efb13f389ab

  • SHA512

    004c65c2956206e7e9eae7f9db98f194a6e4b962832b60549b07269e683df103ac7424f6c0f8f0100a352a2a9b9c38af60d8ca7c8c97149ad5a08d889be22c89

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9qQn:kBT37CPKKdJJ1EXBwzEXBwdcMcI9p

Malware Config

Signatures

  • Renames multiple (4173) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e636d5e5fb6d62b7dce5bde6a6076ec000504e43ff9a577a58917efb13f389ab.exe
    "C:\Users\Admin\AppData\Local\Temp\e636d5e5fb6d62b7dce5bde6a6076ec000504e43ff9a577a58917efb13f389ab.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    25KB

    MD5

    ae7ac0fb1fcb62c4b7f88c0c21410b77

    SHA1

    ec558cc1dce51759827f3f2354ce4116ed1ee6b2

    SHA256

    f21b3a8693b4d2422346f62b63d0c1ab7b40ad1d458abed7ccc4b2d8482ed726

    SHA512

    6c79a379f89e54f0e1818c18cdca7f7ca74e60833b07c32abb9f3c5abf4da0a3f353b0c86ef30f7d8efa723f56ff9e699056af4906663a3df6bc7b0124c87d41

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    33KB

    MD5

    651e5765a05a830b5e7e2d5293a319fc

    SHA1

    a2f8e1b7c7cbccb7a6dd6bb033283f9f6af64c2d

    SHA256

    0c7679a7c7428c796f70a88079d815e2c28d29169bec4fced5a418c549818f44

    SHA512

    0fae14b7483024c39cc20c802cd5db2300ddd43d64d1f59935f1225e3c7cc2d335184d1b45c951c24339981dd46a599f56c91c40d9d8c08ed0ac1c314805394c

  • memory/1520-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1520-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB