Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 02:42

General

  • Target

    8348f9f6b5d582a4888adbf78798b9c0N.exe

  • Size

    112KB

  • MD5

    8348f9f6b5d582a4888adbf78798b9c0

  • SHA1

    cd459e003490100f2cb10f5867dd5e18e6aea0af

  • SHA256

    2449530b5d03647c00bb8b748eb69a8f4a12a24196f33da8063b0df49e8ad696

  • SHA512

    130dc117b45cda24fd949669efce80da79749630c2a2d443b3e6c8815ad58f1d8d41b72fa8a606decc626d3ee5c201b19f029245e20110a38735d13bb2f89c39

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8asUsxe+eX7n97nPll7n97n0G6/cqGiN:enaypQSohsUsxe+erZLZ0G6gZs

Malware Config

Signatures

  • Renames multiple (2080) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8348f9f6b5d582a4888adbf78798b9c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8348f9f6b5d582a4888adbf78798b9c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2172

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

          Filesize

          112KB

          MD5

          360f66b9050d94cb04c9ef24c3eda1cc

          SHA1

          93ac92ce04d19ebb1ab55566f0cb01efa46222c0

          SHA256

          87d26e4b47e5a0433fda9be9240071ccb403b3aba9fa98a9d87257a8c0734ade

          SHA512

          1fcc44c94fcb50ed905fcf2b92076e7cbbe40920faf514c3807516b97ec9b5c76ceccbcdfcc3089a84d90b012a3c37aab4731ad478504c50470bfc99fca76fcb

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          121KB

          MD5

          713c8033e3bd63152b34d8d444708715

          SHA1

          9adf2086b6e28865c21963c23f4d814f8391abe5

          SHA256

          53d487f08dfb24ed49342fb63c05caf0ee04e64cd6a4edc7e172d19ef26935d3

          SHA512

          15ec0a50d52802d25d7fa32bbcec59cfe2743470dc02b130e9ec8aa5bd7bb5d798f8e849f61431aa625626f806e0ef4b04f8d5d6796b48734dced89ba7c15fe6

        • memory/2172-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2172-160-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB