Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2024, 21:56

General

  • Target

    59ea94c96d8bf9f4c81e341dfa599ca717025250c6020a68b818126ec48a9bdd.exe

  • Size

    71KB

  • MD5

    24f4a80fa95b9bdaf450162b61d129cd

  • SHA1

    b8b29bbc4a62ef890640484dc945ca73c8bbc488

  • SHA256

    59ea94c96d8bf9f4c81e341dfa599ca717025250c6020a68b818126ec48a9bdd

  • SHA512

    73633b9279512bc9282685ede43bdaf55f7d405a765f37313afc8f66ec1c446132b11e168b2535cc88e5e7ad6fdc885e4edd8a4ee56a90c7ad19aeef9726dbbc

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9Hx3R9pi1xOR9pi1xbJBH:V7Zf/FAxTWoJJ7Th9ko9kvJB2JB2

Malware Config

Signatures

  • Renames multiple (3508) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\59ea94c96d8bf9f4c81e341dfa599ca717025250c6020a68b818126ec48a9bdd.exe
    "C:\Users\Admin\AppData\Local\Temp\59ea94c96d8bf9f4c81e341dfa599ca717025250c6020a68b818126ec48a9bdd.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    af942290eccb36bdbb814ddf713429db

    SHA1

    adf41580feb000995a67f5106b50867b6c8660a5

    SHA256

    ffd6001f8bfc5d6686bf7211ff734bc608618b42d90446654a73d54164e98b6d

    SHA512

    5ac00ca6928d5eb81558afe354b6dd6bded94c4f3c91940d23b1418f65a3c5054c807911e7f95d69e5ccb5642506c54cd6ccda75a099797b5f5ecb90e3c43263

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    80KB

    MD5

    c70aff5ebe926447aa0023ac17283533

    SHA1

    9d73f950ab0835902a9bea84e29a9b46b02777f3

    SHA256

    e05af65ffc076962c93a1888732e2a444e9c513ca937c352bfc4f4d87a9d7fc6

    SHA512

    2c39456566122122582d1ec0af58bbab33016d3bd0e702bd34b387060775d061f0d26e82437b5e7d7685d8c73ed42eab1f39cd01d5b32d408979778d0575689d

  • memory/388-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/388-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB