Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:51

General

  • Target

    baa3518249892a7f5e368765a273efc35da1921a20e22c9a9633d250334a4d6fN.exe

  • Size

    52KB

  • MD5

    617a60682d53c10b56bf9f28a3595420

  • SHA1

    dac56d4bfa0a580103917eed9d48c9505a3f13e0

  • SHA256

    baa3518249892a7f5e368765a273efc35da1921a20e22c9a9633d250334a4d6f

  • SHA512

    45c9f43b5a4e38bbe8977288a43e0177e31fa597f6641c473b2538272504d850bb8b304bbcda4569f68ab30acedabb63ebeb554c237e1dba149abac1e8762502

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9pBlMBlS:V7Zf/FAxTWoJJ7TPBlMBlS

Malware Config

Signatures

  • Renames multiple (374) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\baa3518249892a7f5e368765a273efc35da1921a20e22c9a9633d250334a4d6fN.exe
    "C:\Users\Admin\AppData\Local\Temp\baa3518249892a7f5e368765a273efc35da1921a20e22c9a9633d250334a4d6fN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    69e4bb96522043a45ef859238dde1183

    SHA1

    52d7bea59da9a7ae9c6426ffb33f537fab614e1d

    SHA256

    883fdcce3d58ce6f423491c463bec7cc58019e69c873c1460559311088d08670

    SHA512

    cf4810c0c9ee14b2400d757d6a8b93b0a36fadf4490f7a01caab0fd1cab21d803971689b8950f51c2c3891848ab93446114ce2712c36d9df966497697ce5734b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    af737ab97a4ccd90b635db0fb72f6117

    SHA1

    d1bab7e5dceb37aa7dec83302ce12819b716c045

    SHA256

    737781ccab6345882de489ab139eb24bafc6c790aa02b75d877ab26262b33368

    SHA512

    20aa6a7a49c9bd01956c8be6b29c522ddc62f091c1b386ccf510c3ed740c6fbe7f48633fa7c1eaf91742cfdce85b30a05e8b9e0bbd0455febbf55c38ef8dc697

  • memory/468-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/468-26-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB