Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 03:43

General

  • Target

    936b6be955e7a6a5319da01208440ebcbcfe392e8763816964ac9619be6d54c8.exe

  • Size

    101KB

  • MD5

    8f8b93cf86cf9d2837f5aa881342deb5

  • SHA1

    aaeb9cbebd13c3959e03708a4185c4d726e360d0

  • SHA256

    936b6be955e7a6a5319da01208440ebcbcfe392e8763816964ac9619be6d54c8

  • SHA512

    259c3ec046e09fa0a0487778ac947c36cea47e46486a788ce3e9c0b2a47464978be4b319b19679c50ac8584a72de964b9e6d62af1ebc7e686740081868672e3e

  • SSDEEP

    3072:htEr9iMGfUSaOy9SnJUwFU+FUhFUeFUXFUqyqKRrpF6PwZ:fEr9iMGsSaOyiM

Malware Config

Signatures

  • Renames multiple (3287) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\936b6be955e7a6a5319da01208440ebcbcfe392e8763816964ac9619be6d54c8.exe
    "C:\Users\Admin\AppData\Local\Temp\936b6be955e7a6a5319da01208440ebcbcfe392e8763816964ac9619be6d54c8.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    101KB

    MD5

    bb5501d13c282e6fbe6c78b6baaf8290

    SHA1

    3e2b2237d408e5095a52b59d199c12ffa4d6a1c8

    SHA256

    cfbe51815287a559cbdd0e0cb74a530c2d57ee61e1a1a9474633891bb47e154c

    SHA512

    c22f607d3087f2f78254e33d622964af99a9582695fd550d2e9ac0535b7a861f23c096bf419b4ab3e4f14f9db1a284ddc4ea1f0b62057cb07f4141e5e8868eef

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    110KB

    MD5

    afd22f166846311bca0f6aea36e0da42

    SHA1

    6614c7b6e1003c187b89714570600f48480cafc4

    SHA256

    118ec7f15c86da920d1427b5df14b058b2aa820f4570a8f0129a7bad99e7a0a3

    SHA512

    395c61c0279313e201d7ff1c723e7ccb6031d75cba82fc7d3eadc6178243f241fce698c1d36ee2b390229f6940ed7c577e284454b999bfdd461d29b76c092566

  • memory/2656-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB