Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 15:09

General

  • Target

    db9575557777d38690a769a0f6c6a870N.exe

  • Size

    54KB

  • MD5

    db9575557777d38690a769a0f6c6a870

  • SHA1

    4953688b383023e72b43d656371e2966e49275c3

  • SHA256

    48e80c1a45ff4bdeb0a175a74cc4383b7a4e91075f3013a6ff441b1d081faa4c

  • SHA512

    a2dddab6b78a568e5a53e7ba2a369fff6dc1b9215bbb42b2f8f11bcc37a60ead5cee3027ee83c6383e7156e143ca0e114d3f727d92e3d1aef3446df1e83291a2

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyN6:V7Zf/FAxTWoJJZENTNyN6

Malware Config

Signatures

  • Renames multiple (2852) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\db9575557777d38690a769a0f6c6a870N.exe
    "C:\Users\Admin\AppData\Local\Temp\db9575557777d38690a769a0f6c6a870N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2312

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

          Filesize

          54KB

          MD5

          13b7362872c9a270f47daf3332990311

          SHA1

          61ad48954ca15489a1213d2164c648a23b58bdd4

          SHA256

          35ed2fc9eeedcf3af6b9108532a45591219636199eee673360c3193d7f1192bf

          SHA512

          6437fbebe7055e876bad7b15baf17b89f992ebd56b2f4020117dbbc8a57db115490ea0f79e1828b291ee61b3a07f61315906ce8bde7295920eade383e06e8725

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          63KB

          MD5

          739f55a92aabbf5066c6523b909202e5

          SHA1

          f02a0e37f9890c1bf5af94e4af8eaa0b85905d64

          SHA256

          c9b70a3f29a1c65610bd0933f505c3fbcf9a5bfd4cb91c3922f0bc5bed53b2b9

          SHA512

          f2e2245d12f4d0f2716a049cefeb797da843d5abe07c80b1e1debc7b87e3edef34116f8fa674769c134590d2efa48f74fb8421c6b639f1997ebfa2adde61b045

        • memory/2312-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2312-398-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB