Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 07:19

General

  • Target

    be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c.exe

  • Size

    60KB

  • MD5

    8277b65d3e0c37d1c5857776a7d8f2c6

  • SHA1

    0d4ef0603abfaf592a4bfc1385f3a5cb511ceea8

  • SHA256

    be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c

  • SHA512

    9a006ee5d3ca1f534874cff906a6e45c147e4e062c52be40e628942f192cdae96dfff3a6c320cd5ed0338449c922aea197f056356f1b7b63d01515c50092a5fc

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15Rn:V7Zf/FAxTWoJJZENTBHfiP3zemtjF

Malware Config

Signatures

  • Renames multiple (3443) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c.exe
    "C:\Users\Admin\AppData\Local\Temp\be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    0acd2e868be7e35caa6251682c8275bc

    SHA1

    8d618dd9faaa2c250612da199a8a90f52bcc5b31

    SHA256

    3bb7917774f803bd02723c2c0fd412d62a2b5aa63b0529f33672527f2f065283

    SHA512

    3d731ce0a0a200e6944b336196c465819e735ca8d66b4a5bad346b064bb4b44f29fad3f3b5090bac8bb170917c24c0fefaa48071f65236faa874d5a855225ee1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    69KB

    MD5

    0ad118b345c2fd948bfef2f1eb95906e

    SHA1

    19820f4b741b8fbf758a9ad4d9ddbe91189453c4

    SHA256

    28846bbc108cc63b924829494666ddbaeaab2c21922ea8115a9671f0e794492d

    SHA512

    79eaae3906444374a4f2ef4d6508986d986b33dc434b404051f7694b928adffaac21fe4e23758dd469448936812c478b025298210e09100780bb1de98213ffa5

  • memory/2984-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2984-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB