Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:58

General

  • Target

    e7bd453d4a42d2c5ecdf5d7f7b997e7c84a50f83bd521e70a41a413b29c4bcbe.exe

  • Size

    81KB

  • MD5

    2415721f1d3e5f940aa1df2f51f8a372

  • SHA1

    8f095b2aac2beb62eb23d425179f861708b8c9ca

  • SHA256

    e7bd453d4a42d2c5ecdf5d7f7b997e7c84a50f83bd521e70a41a413b29c4bcbe

  • SHA512

    32ec82f6d00b9df27e1c1e1401c71ee95d4e1a04bde13859a8c615cbcd90191dc1416c48d9b93bd37c3f991451bfb4a671bd149b1b8dace8472914c8833f5610

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9+F/MF/iBT37CPKKdJJ1j:V7Zf/FAxTWoJJ7Ty2ATW7JJ7Ty29

Malware Config

Signatures

  • Renames multiple (3622) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7bd453d4a42d2c5ecdf5d7f7b997e7c84a50f83bd521e70a41a413b29c4bcbe.exe
    "C:\Users\Admin\AppData\Local\Temp\e7bd453d4a42d2c5ecdf5d7f7b997e7c84a50f83bd521e70a41a413b29c4bcbe.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    6bc1cbac01eaeefdce0f37c5f0886b07

    SHA1

    2e8e766600e40080dc05c6037cddac0252ec1af6

    SHA256

    df811258eb1c0bf098dcf4596f4692befd1dda2c1f136523b55feaeba60223de

    SHA512

    656e322030b05bbf499b4b95271816c89d7cb57b57e25a8d71d172bec55bbcd7723c80902f1febd21892606484901a54ac90b9f8307417222dfab951877d41d5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    90KB

    MD5

    341e2a8776d5b072ff74816a97d5a9f7

    SHA1

    2ea99010f50b3033e53c9be3fa0dc6fef79c79bb

    SHA256

    1ee3058d2370619fd3c3600d29c99eee63693fa6232686322fc5b450526539b0

    SHA512

    26d0ba53dfdf79208e64c0c9c63b58970c26203e2dc63f3ed7f7ad0dd8b1407df04253f5256fca1d359e2cca1d44735268bb05794c9c63911fe566b42189f5c6

  • memory/2128-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2128-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB