Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 11:22

General

  • Target

    367a433c3c0ed17b7bbbd8b9e58764f9a0ebcf599872153d1dd7fdfd1629566f.exe

  • Size

    115KB

  • MD5

    7745671250bce0a2eab978b0b1f0a212

  • SHA1

    b9455d11c8f1a5c22eae4ff944cf93bb548a96c0

  • SHA256

    367a433c3c0ed17b7bbbd8b9e58764f9a0ebcf599872153d1dd7fdfd1629566f

  • SHA512

    64544d1d9de8f57888cbc823fa55f77ff3de44e3648f4192044a237a0aa758693bc24d321badcc34c77d252814434fe1db1fbd241152343a5b80b64b8b01ecd0

  • SSDEEP

    3072:ht9iMGfUSaOy9SnJUwFU+FUhFUeFUXFUqyqKRrpF6Pwb:n9iMGsSaOyik

Malware Config

Signatures

  • Renames multiple (3438) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\367a433c3c0ed17b7bbbd8b9e58764f9a0ebcf599872153d1dd7fdfd1629566f.exe
    "C:\Users\Admin\AppData\Local\Temp\367a433c3c0ed17b7bbbd8b9e58764f9a0ebcf599872153d1dd7fdfd1629566f.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    115KB

    MD5

    ddc9d73b9a6f8d827e99e6251832be97

    SHA1

    0781dc5d4a4be37696f7c603c4b2e636d70259e7

    SHA256

    366fbd2eb1fe4479b8d1c02aaabbf67131e1dfda4a16ff58fd322bd74d948f28

    SHA512

    08d8a790bf6731d5b9b29e928b8c088fe8609be7bf1bbf1cc979b3f622e874569b2b5e8de03b69ce63245a46b97c063ebcb6507a0478bc65886c3695564c5267

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    124KB

    MD5

    a741147a66785b735102fbe2f780264d

    SHA1

    c1f6adcd33fc69647fc1b7fed083c2c96131bd50

    SHA256

    6ce73b66d120054b300bfaed0d247eb3c7c3494e7d00313caa22c312f0d6beed

    SHA512

    ef5dbbef8fa022bbf0742a1ece13d7cdb8268ff20f78687435e0b8f298b2081189c20769505e905e8fd57aade97ec6e8a6d6f0725c249507b43cae379d80ed41

  • memory/2112-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2112-69-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB