Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2024, 21:35

General

  • Target

    4e33ae49c622b74926f22455de745381f5bff13d9560308d7d53c5ef3b86c78a.exe

  • Size

    52KB

  • MD5

    0e5167b8f4e92469fd83c6e30c6b4c37

  • SHA1

    605f3771eddae8e59d0dcbe853386f68b59707c9

  • SHA256

    4e33ae49c622b74926f22455de745381f5bff13d9560308d7d53c5ef3b86c78a

  • SHA512

    000800c3ec3e3d33b0514521b866e793755571721a101781ec2de6e968354fa07a190fb2e3bcc5c2c17a43e30fc60baf99917dec84dd524c9775a40878cb4c31

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9p:V7Zf/FAxTWoJJ7Tz

Malware Config

Signatures

  • Renames multiple (3751) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e33ae49c622b74926f22455de745381f5bff13d9560308d7d53c5ef3b86c78a.exe
    "C:\Users\Admin\AppData\Local\Temp\4e33ae49c622b74926f22455de745381f5bff13d9560308d7d53c5ef3b86c78a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    cfc17f79f0794885fb9d1aa600e210f8

    SHA1

    24273ad210be63f49ef3635419beaac889b80692

    SHA256

    21c018139467aaeb2d3231fad114f98bae6f8b35db445d9e02c2cd71313a4267

    SHA512

    b95f6a4b43926d42ba73d1e7453c296877c040b426ed82a04869959827997a8d5c43345a89db200873e7206cd7fe8f7e4673231284291a11d66610f274d95143

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    ec65835a7ba4df0e32c707945d15c649

    SHA1

    c17d7a8cb98749c4f628f7c62673dd16f3f286b5

    SHA256

    d81b7207ddf85d695428ec80176fe4fdd171ef7c6f9a0b55332ecdd8a4298341

    SHA512

    495d1c355977aae4d7fde5430ff2f143ab4395866f47aa5b7ac767c96294a729ce36085246f8e6a2d8f00c6ceabc67c402a21f9fa411ec286d3396d812fcad60

  • memory/2648-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2648-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB