Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2024 00:36

General

  • Target

    a35314fcb66859ce9b63724a033a600b0533821ba1ed7da959511a5b0a2bc369.exe

  • Size

    90KB

  • MD5

    9c1bfc575995f931e0dd76ce2633e2f0

  • SHA1

    7b0120e4ac0a56b58ccd1433783111d43f0bdf77

  • SHA256

    a35314fcb66859ce9b63724a033a600b0533821ba1ed7da959511a5b0a2bc369

  • SHA512

    eb9eb4467b5d587634b36c674f11eb04fad3439723fc19204024f147df8636ef8247b7a744912d743435c9f7a07702a8884f332fa2ac27081963364cdf4332d8

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5Kwl:fnyiQSox5Kwl

Malware Config

Signatures

  • Renames multiple (3519) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a35314fcb66859ce9b63724a033a600b0533821ba1ed7da959511a5b0a2bc369.exe
    "C:\Users\Admin\AppData\Local\Temp\a35314fcb66859ce9b63724a033a600b0533821ba1ed7da959511a5b0a2bc369.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    91KB

    MD5

    f25a2cfdc2ebbfa5eacc4a9a271f81d5

    SHA1

    48aefa5f26bfdc4ebbd735d05b28b94afc0ea230

    SHA256

    f309ce2a28491c01b4153211ed79fa3e8f7bad12b5ddb4eb0ef93a9b8cc10425

    SHA512

    5effff1770a8a5a70ab5c08969296f5f6ddb00e2bff1808150f7e8ce0b43833d03cad2713991d14cb8beddfa110551ed5a011e4cc69d5d0a6f352832984475a8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    100KB

    MD5

    9ff7f755ed7a3081498a810b1e89aac8

    SHA1

    285fbd8b1cd45fbc1aaccd286b8822dba9242364

    SHA256

    bb1416d57f2f889c41fcee554c483833f5549dc09463352d8e162b61174b41b6

    SHA512

    0dafa5d3533ac1a0a54425e1915ce7470caad9f414364cd9e8a15cf59353c9ae9f5ff09999d8a2bcd9136ca7a1a42e58b6e884d946f4fdce753e703fb172e219

  • memory/2568-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2568-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB