Analysis

  • max time kernel
    119s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 16:01

General

  • Target

    b25c746c98360331373da9fb9fc830be1a037ba2f6cdccb7b1296ee20e38a6a4.exe

  • Size

    157KB

  • MD5

    ce4f2da869e454586dd14313e94ff94d

  • SHA1

    497c88e233c8a4f64e388ebf9005c12885773e4d

  • SHA256

    b25c746c98360331373da9fb9fc830be1a037ba2f6cdccb7b1296ee20e38a6a4

  • SHA512

    f06a79124a0e68e9774a1416482e50b90694dc442c2f71733dd73c471b80a448f6729806fde30b66b8c0f840a4c1d27314200706d4b95397a0bfa6b76fd5cdf1

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBHfiP3zgn94pWHlPEXZzjUq3th5f6utM5vLNinVmWvMu0bV:fny1tExnQWHIjN3tj6qnv0b2UrXkbvLW

Malware Config

Signatures

  • Renames multiple (240) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b25c746c98360331373da9fb9fc830be1a037ba2f6cdccb7b1296ee20e38a6a4.exe
    "C:\Users\Admin\AppData\Local\Temp\b25c746c98360331373da9fb9fc830be1a037ba2f6cdccb7b1296ee20e38a6a4.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3692679935-4019334568-335155002-1000\desktop.ini.tmp

    Filesize

    157KB

    MD5

    b5e443da4dfb0f6e2b9b1d031c8e160f

    SHA1

    884a40b9205a255358f1108af2bcc6f416f87d6a

    SHA256

    db6305bd595f1ecd727720f6eb05979d0dd731f67cb5c3fc5a59d3e570963790

    SHA512

    c9f35a52c3c08da6809f27226d264adb946aebe6a3534d9acadf62743dd491a7ede44c1c7f824a2a237330c85685afe0378e9eebce9e6bdc073dc44c1ffe1c97

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    166KB

    MD5

    55f254f20fc0a805356a1051245c1e26

    SHA1

    51ff4ca09a3907b78c4e534c99a7cce9b782326d

    SHA256

    1a630ad5f0b419238bbe09c3270d8cb4ac1dba723b699d676875550cb7ece54d

    SHA512

    c29eb8fe91676bd9dd37322ad7b6d70523666376ef54b039d5390e7e92404be3f1e63580fc000ad95717e62c0aff2cefc40b09e0461df960cda581ced618571e

  • memory/2376-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2376-22-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB