Analysis

  • max time kernel
    120s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 17:44

General

  • Target

    83f10d830d7ad673d7de8663401a9785a3221a8db71eac76975359cdf5f9a55c.exe

  • Size

    57KB

  • MD5

    af3f276b21f1b615c7fd39894558ca77

  • SHA1

    7c67eff41d9d4eb4e454cef571abef0a7b7b53e8

  • SHA256

    83f10d830d7ad673d7de8663401a9785a3221a8db71eac76975359cdf5f9a55c

  • SHA512

    cabd92c02f3170f11848b1735d1cd44a570603b40eecf72b0d3a6afaee2221c866385d3de5b3c31a31366734a799ed6d92e4f8ebfb83e18af20116b031eb6311

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15RD:V7Zf/FAxTWoJJZENTBHfiP3zD

Malware Config

Signatures

  • Renames multiple (2789) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\83f10d830d7ad673d7de8663401a9785a3221a8db71eac76975359cdf5f9a55c.exe
    "C:\Users\Admin\AppData\Local\Temp\83f10d830d7ad673d7de8663401a9785a3221a8db71eac76975359cdf5f9a55c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    2e884c887f562953613d8fc41b48a8c8

    SHA1

    960cf59a0b8316b815c22b35e927a9296df38619

    SHA256

    f835d74523e498f4a4e1ead0a21ce170a853f8dcf66e668abea435d9314466e9

    SHA512

    97fa5c2658f2a50475a8b74c51a5a47140329cc58366d2796680e2aff771bef68b78878ad1fd97d5034bf4e268ec8a24d932b16d6303560b0e813e99f918d459

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    bbd8b625e60c5f3986e78d2c6027e106

    SHA1

    9041781bad93f339bb45a5e5a1a26bc6e5417e9b

    SHA256

    371640bd84e206c85a88841a6100962876f36f4e4b3757a32fb5aa96643e930f

    SHA512

    688a895e07a010d0e576bfac2c97c0bcb2f24d1ef33296a6f50de8ca662d8693736e840ff7413897c58d1688983abffbbbb0129922baff1df41eb5d83d1f0a45

  • memory/880-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/880-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB