Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 17:53

General

  • Target

    83f10d830d7ad673d7de8663401a9785a3221a8db71eac76975359cdf5f9a55c.exe

  • Size

    57KB

  • MD5

    af3f276b21f1b615c7fd39894558ca77

  • SHA1

    7c67eff41d9d4eb4e454cef571abef0a7b7b53e8

  • SHA256

    83f10d830d7ad673d7de8663401a9785a3221a8db71eac76975359cdf5f9a55c

  • SHA512

    cabd92c02f3170f11848b1735d1cd44a570603b40eecf72b0d3a6afaee2221c866385d3de5b3c31a31366734a799ed6d92e4f8ebfb83e18af20116b031eb6311

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15RD:V7Zf/FAxTWoJJZENTBHfiP3zD

Malware Config

Signatures

  • Renames multiple (3337) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\83f10d830d7ad673d7de8663401a9785a3221a8db71eac76975359cdf5f9a55c.exe
    "C:\Users\Admin\AppData\Local\Temp\83f10d830d7ad673d7de8663401a9785a3221a8db71eac76975359cdf5f9a55c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    4e1f92ea614a3a17bd7fc24bd3d51179

    SHA1

    769fff0c34c6e5b6b48e9a13a2e9f1808b0bb09e

    SHA256

    38b4977981618c62e962efa02bd1d8322f7b379e4b6a2a21cbdfd0476a195730

    SHA512

    24d2e061a223b2cf70b119cccb61bfd772b7b05cb83c1cdedb880e07b0495cd98931a8e0c5ed39ea25c58c2e0bf4702b1e9212c14de4bd1e9f8074ef97f4337d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    07ea2553146ee010d84a8e237d79c4f3

    SHA1

    3b224e4c40245d3a98fcc4ebc770498fcbfa3bcf

    SHA256

    60ad72cd32b189383c5f078aa008e8dd8e65d1f2602bcb974b798be2aa3a5a74

    SHA512

    3173a9aec348e119b5a43c27ba2d27056d94e926a487797b390609afdda9699a60bc9cd42b5e6a02b2dcb961a896d1d59c6de2f148957f13c30dbb9a4ce39e94

  • memory/2212-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2212-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB