Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 14:16

General

  • Target

    141499b43c151bcf32b5b6b5274698fe4bbcda6210fbc6a6aab2868d8eff4a54.exe

  • Size

    44KB

  • MD5

    9122d3572e783604c04fdae2011961cb

  • SHA1

    8b1c720bab6f75ca3e5f3e18ef9b9bd2b11707af

  • SHA256

    141499b43c151bcf32b5b6b5274698fe4bbcda6210fbc6a6aab2868d8eff4a54

  • SHA512

    80d55037ce8a4367f9cebe0ebd0cdf61818624d92a9f2d5920b1e2af11da41d6b7038f2aab76d9011d73768d533e52af7e1d9d54559a2d728402880b13a7a2d9

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATB7JGvBJJGvB2:V7Zf/FAxTWoJJZENTB7JGvBJJGvB2

Malware Config

Signatures

  • Renames multiple (2810) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\141499b43c151bcf32b5b6b5274698fe4bbcda6210fbc6a6aab2868d8eff4a54.exe
    "C:\Users\Admin\AppData\Local\Temp\141499b43c151bcf32b5b6b5274698fe4bbcda6210fbc6a6aab2868d8eff4a54.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    f24b1e8454dc50a6e5864fff7b7901ab

    SHA1

    c457808171ef2d18a3cb192033b46d819ddf8064

    SHA256

    25597e55783c4197c6618c3afe25aeb7808b6c121b6e27178f3aedd2fb5339f1

    SHA512

    13eed46744f2881606d377fe41107227907ab31e11cd1fa5b252bc3031f646614c53276e3854a126be7db536132696a6245e7031d9b8a69d8cc60acd2cdb9cbf

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    1151fd287d6dc71eb1a083397be4e9af

    SHA1

    d275a79f4bcfd5c6cfd1f9c459950e10b7f4d232

    SHA256

    fcb7ec7e0dc7abeacef99eefb48e08f0e3bb7715e48ba5def5db39db19f97a62

    SHA512

    8acfec43b31a9877550111b6a7ce008bc3021830b5d70ce9963a208860210a9c05e1ca93e2838254955055b7c2b6cc8aa4e1c9caa219b61f4071d4e3f46983f5

  • memory/1520-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1520-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB