Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 23:39

General

  • Target

    896d9e12f68faffba95c92e5da80899b94b2d2d766aabdc34126878a861f458f.exe

  • Size

    53KB

  • MD5

    7c02198bc23d5a6cfad5fb52c64ea272

  • SHA1

    725a8e85ee0bdaab0aae847354e2ad7c0b1f52b0

  • SHA256

    896d9e12f68faffba95c92e5da80899b94b2d2d766aabdc34126878a861f458f

  • SHA512

    36f5a8648d1e7e76e513a339795519faccc5d0cd125d476e08b9d41efb599af4c7a5a37923c6be1641c14164644cd67ad27a65aa7ea0729cb158f00eb03bc171

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9Ro+QOViJfo+QOViJY8u:V7Zf/FAxTWoJJ7TPUr8u

Malware Config

Signatures

  • Renames multiple (3804) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\896d9e12f68faffba95c92e5da80899b94b2d2d766aabdc34126878a861f458f.exe
    "C:\Users\Admin\AppData\Local\Temp\896d9e12f68faffba95c92e5da80899b94b2d2d766aabdc34126878a861f458f.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    7f7681e591754a028416758f8544f3fe

    SHA1

    82f08f4ba58b0adf464bc07d5154166e0f7140c2

    SHA256

    9a6f8dfcfc5e007179ac0ffe4088d238d3d5255f418de417b07493e03d49f019

    SHA512

    482c17409ca1d01637f4e322f2b4bfc4a83c20290844213b7440203c8930c23725177e377c0bf8e06134773c7af1131c8e90b57f6b38b5c376b3dc75a468f028

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    f7b7b0476457e8a837e2aac71e502b42

    SHA1

    712b123b3c5d04f4d4a875d182ae5a8a5ac58ec4

    SHA256

    6268c27247b2def566c0fe7d3c70d3e082cce9ee69c034bb935bc9703a279bc8

    SHA512

    00a2130d884b3e8da3663b43df4d02019913dd32dced742966b3f81a0a8adc19b3d93245ac1761c35d2d1d498ad2d298cbbd24e4630e2be4d688ce590998f66d

  • memory/2404-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2404-72-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB