Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 17:31

General

  • Target

    378a82d02ea15f414fa4063fac68e780N.exe

  • Size

    102KB

  • MD5

    378a82d02ea15f414fa4063fac68e780

  • SHA1

    319c42af1b7b41a436fcf2fcd82278e2e46b36f9

  • SHA256

    95668b1e4ddce8f5703e7f85600ab68a00780e875e66c73bba1b3b3483d30a7c

  • SHA512

    b79e88ae4842ffd004baeff2fc3d2d88aaba21fa97efd5bd51c459000b855ac1b955d5ad79c9cb2806432212641c8ed9780ff22590fb71ea2d0d9a3596c3f696

  • SSDEEP

    1536:V7Zf/FAxTWoJJXV6Z5P4xHsthhg/G5ukR+7bHl4vaMPpxIjCTk6G2KZ8qoazwbgi:fny1bHg

Malware Config

Signatures

  • Renames multiple (2697) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\378a82d02ea15f414fa4063fac68e780N.exe
    "C:\Users\Admin\AppData\Local\Temp\378a82d02ea15f414fa4063fac68e780N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    b3b1da0655754aa167f0b6ac375ed588

    SHA1

    1a3bc2df93101cdd8d67df056141dea018e44593

    SHA256

    80a08f468444abe45da608d773992c1fa0f55db1bd70303445c30c3f39a17e94

    SHA512

    c6450538db3a459f4f2ec208a72ef004f17e0f173723e78b51f240b3025af7342c69303d9d286e4f54b7dbc44f44a107d06e46ad7e03e2ed831247dcc5dde3a5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    111KB

    MD5

    1077eb6fce7c2da676402c3ebf973bed

    SHA1

    384ba527eab2c7f6c4751c1245a61b460074d181

    SHA256

    33ea97af44f366673188e015b2f4877a4ca825281e11894680ddbdb18053d8d0

    SHA512

    e44e7412d4dcc721006581ee16f422d27f0979188a73db044fcd485b006fc1ac667f5f61b93c04515d16278adc58264fb4b53f71d90572ed839de02c8f19f5ef

  • memory/2436-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2436-242-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB