Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 07:02

General

  • Target

    be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c.exe

  • Size

    60KB

  • MD5

    8277b65d3e0c37d1c5857776a7d8f2c6

  • SHA1

    0d4ef0603abfaf592a4bfc1385f3a5cb511ceea8

  • SHA256

    be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c

  • SHA512

    9a006ee5d3ca1f534874cff906a6e45c147e4e062c52be40e628942f192cdae96dfff3a6c320cd5ed0338449c922aea197f056356f1b7b63d01515c50092a5fc

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15Rn:V7Zf/FAxTWoJJZENTBHfiP3zemtjF

Malware Config

Signatures

  • Renames multiple (3399) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c.exe
    "C:\Users\Admin\AppData\Local\Temp\be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1163522206-1469769407-485553996-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    9d277dce971a88a08722aca20fa6d4e0

    SHA1

    25fb2507f2e4dfb8ed772849baaeeee61337a1d7

    SHA256

    951bcbc8a0d78b7d5622eb4a8ac27cf23dce0f333b823ad528639a77506f0b7d

    SHA512

    b1ebacd3607f9d8a41d255aed07dbaf6c4aaf30e33d2bcbbec423f45200c0756063e9c63a829f08a4051f3ecfed7fe26a6191f9be6d1e2137f14b273633e005e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    69KB

    MD5

    0b53bdcecab49576106d0d5fde00bc47

    SHA1

    3cc57fa358d0be87cc8a8181094c1b8abeb8f03f

    SHA256

    e7bf314256b02789275f0febf0b5425d942c446868d2cf3371579c49af65a89f

    SHA512

    796b3725db5cd0e7642f79e69862464b4c323efd23ddcb935829c3eb2fc5764a0be07b761a6a7eb436f4e430be0b1cde708572e81ea754d507fb52b931399451

  • memory/2020-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2020-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB