Analysis

  • max time kernel
    120s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 22:06

General

  • Target

    1318c1b5b998c30fd6d0ddbe980e9f50N.exe

  • Size

    51KB

  • MD5

    1318c1b5b998c30fd6d0ddbe980e9f50

  • SHA1

    8910fab7c1a32fc3182f2989708b1c4bf37c9504

  • SHA256

    63ae77e76c5973c37af203aae3ad646c9e36a5665a0ac266ff59fb05ec2b8d29

  • SHA512

    85caa157d34c65dff1bc9b219af007b2dfc3807f6eac633651f0aa0e2d6479db429497f5712b09b3535f5b88e2d18eb1bdc0242c9f9b1d6c6a00c4ce9c46998e

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJBZBZyF/MF/orMalYJ/ig/iumF:V7Zf/FAxTWoJJB7i2JalYpbm

Malware Config

Signatures

  • Renames multiple (3216) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1318c1b5b998c30fd6d0ddbe980e9f50N.exe
    "C:\Users\Admin\AppData\Local\Temp\1318c1b5b998c30fd6d0ddbe980e9f50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    aaf8fce0becfdab651544a3d97aeee9e

    SHA1

    db3a7cac78cffe33854d0622381869ebe2ef557d

    SHA256

    9d3a7159d11e225a8c6d2f4ef8d4b6e7a28b091781e7cb536bb5fc805d5c87ac

    SHA512

    26fc97a69cab7f1bd9fa038e5e4ae511c0e431d29a08ff88546799759184dba8ca63f8c322a6925d9f7fb242dd51bbc015f710b82f5de02f997e2c254c8dfdff

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    989a7f455fe8089617ce866cbf3193cf

    SHA1

    32ebaf46057b6e4c8389acd40a06626bebb0e190

    SHA256

    0ec26f2ec7387c61fb384bfd09f8cd8fa4298cfd051619370b4d17cd6c77d6b2

    SHA512

    06ab95e45d14dcf793a5cbb24910a24ef3df8b0fb5d2201f9a826ae18f65054432a08709de2cb029957b8686e291a9b60dceba1ff7a2386e5164fa98c2ce1284

  • memory/1688-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1688-650-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB