Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 11:14

General

  • Target

    exe006.exe

  • Size

    60KB

  • MD5

    35ded83a665e00296e6f3cc76bb19de0

  • SHA1

    265a71bccce2d379959fcc0fdc905930f8affee7

  • SHA256

    2bf0b568da5437571fe0536aee7d05697e00557eff084d754107398d2a690290

  • SHA512

    476a257ea935cd7d9365330e04b2ea10df7e0b93ee769a2f08009eb87b605dcebc5f7288d0cfa7d2d68ede23bec1243eb049008c8bd67a5bb55efe89ff6c8e58

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15RT:V7Zf/FAxTWoJJZENTBHfiP3zUuIun

Malware Config

Signatures

  • Renames multiple (3438) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\exe006.exe
    "C:\Users\Admin\AppData\Local\Temp\exe006.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    333b214c6bce583494f96425478ab962

    SHA1

    d71af151dcf3b785c8128d6c85fad411056e55b7

    SHA256

    abab8076204825f1d2ca9a4cf50178e6fadc2dab99b37159047809d437aa40d3

    SHA512

    443074f465c1f84ece6f9b4cb259d86e8bd03b2c725b985440c34065769557c87c470fc294a0c6ba57b4101993ca4f4e03c65e97acf53bfafe6221c61332f3f0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    69KB

    MD5

    d2031e34c5dced6a9a60597a03f433b0

    SHA1

    80a8f788585cd5e67f36500f457ed1007936c93c

    SHA256

    7ce27887445b9d6f207d0b7b2485ea678eb85832abfe7daf955033a32284864e

    SHA512

    fc0502e899a297f0943c9538588624c9be5d3e2b299f52f2c910dd906d26ba987d89198d0eb81d4add26799ded222ed5babbae2a97b7b770986a14b48d76875d

  • memory/1720-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1720-64-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB