Analysis

  • max time kernel
    120s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 01:41

General

  • Target

    7bd7d11e6c951094c85962d2415ebea0N.exe

  • Size

    27KB

  • MD5

    7bd7d11e6c951094c85962d2415ebea0

  • SHA1

    08dcca511267ddbe0ad72dac8a9fa23b5cc83d03

  • SHA256

    7f22d2be151b3fbae51b1e0bb569bbc85505daf241c0c2b9df9db7da5e1618f8

  • SHA512

    e305322872344c61660007ed7a35e0096177d0b7d863b751111f07aa2cc4b5bec9fdf5b5fae361aa82e3612ad93163eaa6cf87c7de93dddaff6ab264372a1b92

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJPbUEobUE51lAwJmdSmd5:kBT37CPKKdJJTU3U2lY

Malware Config

Signatures

  • Renames multiple (267) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bd7d11e6c951094c85962d2415ebea0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7bd7d11e6c951094c85962d2415ebea0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    27KB

    MD5

    9d71284e6ed32a3d37d65ebef6c4485b

    SHA1

    376f0033899c580f187ba0906b198047b0293eab

    SHA256

    f821761f77a68540b430f7c3d18466182e9e9363f85b43b918428390218f6419

    SHA512

    35239668bde7732ba83d72068a3cc289350b07a4ff063e1fd91fd133c32e668e1470225bae1e43b9cf2d5a7613c9a14f371f188ce6b3eb0b8a2a9bc275bacff7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    36KB

    MD5

    5b88d1929f78d62bdb62b4fc965e344c

    SHA1

    1c929bc95ca123ec45829f447a97a0df45036124

    SHA256

    c3d2b49dca3a0756799361cb8d2f3e87c7258c80a87f1ea66a939e5a1c7843d4

    SHA512

    e6c8c0d27b6a6e5f869998e302339e72c7dc29b031b677c00a1cc0a8212d1c9a20f5a65686055fc1b87979ab9397c1d1e96c7ab9d3261e76f7422a702bc450a8

  • memory/3008-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3008-20-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB