Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:06

General

  • Target

    eb86308d8318490f1a2195a8f06b926bd269ea9122feacd22d91370ae6b55114.exe

  • Size

    84KB

  • MD5

    7ca1081cac4702d6da26b25163ed722f

  • SHA1

    4ed8f91ee5f60feaaba21a649a81316e2745637b

  • SHA256

    eb86308d8318490f1a2195a8f06b926bd269ea9122feacd22d91370ae6b55114

  • SHA512

    d81f53bddb8b498c860e6d071c8e44284652db4454cc04ad59aeee25631ce19bfbc79fcfe70d4197236f2636ce4b171bc8ad2194d73adb257154231ae8660007

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9tBT37CPKKdJJ1EXBwzEm:V7Zf/FAxTWoJJ7TRTW7JJ7TDS6

Malware Config

Signatures

  • Renames multiple (3444) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb86308d8318490f1a2195a8f06b926bd269ea9122feacd22d91370ae6b55114.exe
    "C:\Users\Admin\AppData\Local\Temp\eb86308d8318490f1a2195a8f06b926bd269ea9122feacd22d91370ae6b55114.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    85KB

    MD5

    3e0c385af5cd82da532eeeb4ca4c99ce

    SHA1

    72fe844ce3bd40540d279144a57726bd3112b1b5

    SHA256

    24e89435cff51ee067391a1149814bbb0ce5aed2b389e65f589dd05d8b8a2e6d

    SHA512

    398766dc6db32fa9de2dfacf8104b88364752ca6d7241d14dc05e93cb405ec456c7175e070088ecbee424bc7afafacd6417db8119c5116ae65e48b04614b3260

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    94KB

    MD5

    c15daaaf97666b971d5bd42cf9ac60bf

    SHA1

    0a78c7d65a598400bef6163e5ca0bda9814a7b20

    SHA256

    989d115f0618c9587dd3a8c691e918c715034e18255653e0d13eddd3f1224a4b

    SHA512

    b18fb81258dfd8c610d81b00d5c7f414e90c08922c914bfae0aa50a761920683a9799911f371d24daaca2ee3ca469ce1f11cf0b8972f0f920a22ee88f9d6391d

  • memory/3004-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3004-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB