Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 08:41

General

  • Target

    69089c1681858c90005ef609a7ad9a00N.exe

  • Size

    87KB

  • MD5

    69089c1681858c90005ef609a7ad9a00

  • SHA1

    ca28ea0487b92c13e3a3f1b5862e0cd645b4b422

  • SHA256

    345a42628df3673e3108d03c44c5a5995d6e00d4da72a30ecda4288122b2d465

  • SHA512

    65695b5da0610e155a47977a68dba491e0e44d9133807046e8500ef619e5cc9a01d10ea6b402a6d6a33a2b059ceb4973c0f6a895cec093c887c7bfe5c8e2449c

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8VCnXxX81M4c6i:enaypQSoPXxX3

Malware Config

Signatures

  • Renames multiple (3178) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\69089c1681858c90005ef609a7ad9a00N.exe
    "C:\Users\Admin\AppData\Local\Temp\69089c1681858c90005ef609a7ad9a00N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2660163958-4080398480-1122754539-1000\desktop.ini.tmp

    Filesize

    88KB

    MD5

    3421e0df6acf524d53573a562a462db5

    SHA1

    7ea0c0d655e4187634372f8ec8f2b7f9fd1515e4

    SHA256

    3bf8644fef30f6983837aa2e84b1b361061f89db05ceb16c154078d88b14dbb8

    SHA512

    c8b751709bac8541d70e1938714932d1c7404a5ba0a07bd39b84eedcb374ad1130910df6291943dbf4aba8a617dbf334fac4707d9958f4fe462a2c021db85b3d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    96KB

    MD5

    3e6f9cedf7b61a3bafb452960ae392aa

    SHA1

    6f5d9991c9801786b299913878a37eef641dc6fa

    SHA256

    90311ccfd39537fd25a47c4c181f5630921f9add17b139d3a1d3e65c2ef6f725

    SHA512

    f15cd9191740ed841561a4a835b766cacbb74b6bee25d16ce842bf2ecae4da46272cad903841e3073dcc65f78ca4b09bae472132ce44af86e6c2928001a1fdbd

  • memory/2128-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2128-658-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB