Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:17

General

  • Target

    8778a7fff3d8f68aae3e5ac805985c0066638454fb563e3edbada51efea27782N.exe

  • Size

    76KB

  • MD5

    72f00c3433d00249d1d6b522055df880

  • SHA1

    eeee36c2ae3ea9b0c6be719ca8a7f77cb54bffba

  • SHA256

    8778a7fff3d8f68aae3e5ac805985c0066638454fb563e3edbada51efea27782

  • SHA512

    a2a3678f519e2d1a5e563594cdb1b534a0b7f216468b1ccabad04afdb51fcceae279a6068bd715144f9abf2fea84c2ba96d7f7b53ccc94ce041b4bb3ad38efb0

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9DrYBT37CPKKdJJ1EXBwO:V7Zf/FAxTWoJJ7TVrOTW7JJ7TVrgwm

Malware Config

Signatures

  • Renames multiple (532) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8778a7fff3d8f68aae3e5ac805985c0066638454fb563e3edbada51efea27782N.exe
    "C:\Users\Admin\AppData\Local\Temp\8778a7fff3d8f68aae3e5ac805985c0066638454fb563e3edbada51efea27782N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    a21b5e0cd0a43d2d7cfb7c508b57d33a

    SHA1

    e6cdf10d93a2f4493614ca6d11ad1b023687c1d1

    SHA256

    870f0b76018d101908e1bb54d42c3fd75341810af8f3b34517b742e52e9f3bd7

    SHA512

    b4bf7777ee2ef9f514f59f97932a44fc9c13ea064ea332a1c6a9df4f1fb299d16300cf85e06342eefd6f8516c463d2681336b574885fb29ec0e2f89cf4e374b7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    85KB

    MD5

    e8559532309ed9c0c38a0d212c650857

    SHA1

    d4de84a12084dba8969a9ac38b0c30f6cfba3229

    SHA256

    5821cdc24a73dcd5284397a7e567938d3ad67e200e7187b07b38ca1a00483d71

    SHA512

    77fa2a6dd002058f5613688efd449bbc3a81bff76dc3d011c8fe132104f4e04133efd5edba51713b1b3029438b7d0c7a00a86683ffebd0c250e099893c5d21fe

  • memory/1140-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1140-22-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB