Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 01:24

General

  • Target

    a120f50a37ac458e8724be1e696bcd169e0453eb794db84d913ec5409881406a.exe

  • Size

    90KB

  • MD5

    6915305837661948cb0d3e2ea37300ca

  • SHA1

    1faf736caee78adca75f5201910ca606523e64e3

  • SHA256

    a120f50a37ac458e8724be1e696bcd169e0453eb794db84d913ec5409881406a

  • SHA512

    d2060df2c0c3a7d6779e0d4acbc1f1074bacad46132afa43a31c51c9215b2dfdbac58a487c81f8776cc7c4388dbd22cc94020d9346bae2ce857d22247c9e0580

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5TUhU3:fnyiQSox5Au3

Malware Config

Signatures

  • Renames multiple (3490) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a120f50a37ac458e8724be1e696bcd169e0453eb794db84d913ec5409881406a.exe
    "C:\Users\Admin\AppData\Local\Temp\a120f50a37ac458e8724be1e696bcd169e0453eb794db84d913ec5409881406a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    b9670200e5368159eec338f62a6b78d7

    SHA1

    d41607062459a910f5ec9d41f28ea87146f536aa

    SHA256

    91c48e9af4d2d8c0d9b9305e05d94948c780c5ac232c190dab691412c89da013

    SHA512

    061986f7da0357d9b241aca0b670820a5b32a5644cdf087891347f492c56eb7d66ed2844792110e4a0b4399b7030295425cb4bd8e2121362ddc8ab1774a9798f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    99KB

    MD5

    73f27ae2403e32060bd832d056a7a3c2

    SHA1

    4927b2a9baae5d082e2fc931e77d617bae669526

    SHA256

    52e94ad56cfd25db814a096a9e400b229b741bfc6c859b46086b8f4078902148

    SHA512

    54888e156c40b95a493edc58c7028397534029724c367173c854003eef408cefb6b3ac5e417dcd5499a4f21be571c276be5d5d58b8f9787eb0b4edbe6da7ada4

  • memory/276-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/276-72-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB