Analysis

  • max time kernel
    121s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 05:28

General

  • Target

    98b59a3f11b44be0564784f665cd1280N.exe

  • Size

    127KB

  • MD5

    98b59a3f11b44be0564784f665cd1280

  • SHA1

    a9ae94ac38e8796ecc1925a302007544cd7f4832

  • SHA256

    797fcde04b7727c458c2b051449b8c1583385d113e3d05de3d06af1c3c98a9cb

  • SHA512

    c725a4a83562ad24e0f9b6dded9ca816a7aecdfdeee6f60fce1d6166ea517122281e7c8750c1ae0c82dc4e934579bcf3fdefa7a73b7c11b878488ec33a4bbffe

  • SSDEEP

    1536:V7Zf/FAxTWoJJXV6C6tfeMW1iMzArE/TidjhyKieiO:fny1bstfeMQiMzArE7idjhyKieiO

Malware Config

Signatures

  • Renames multiple (235) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\98b59a3f11b44be0564784f665cd1280N.exe
    "C:\Users\Admin\AppData\Local\Temp\98b59a3f11b44be0564784f665cd1280N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    127KB

    MD5

    4a7a90d8f8992f90313c7723c000946c

    SHA1

    497367aef0c9496f913a8acc4ba5966c29964004

    SHA256

    60322c3dad7d577f4b5b56e1d7990b50dead108fa488d114c14022ef655a03ee

    SHA512

    335da4303a19d068a48e801b7c3dd8631c0d99e67066a75757284f5bd29beabe600fde56c0f6adf4b854ff38d4fa463bb96f70a451ba0990b8d2d36445970d12

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    136KB

    MD5

    37eea32b732d2e57b2664ff5a3195bc6

    SHA1

    38b84f62a6bb3e4bf24a921bc65b17dcf6f658c8

    SHA256

    7ec77db2dbfe3999b58e13bb93e4ee6879e548d131c8f846f184eaa9ed188df2

    SHA512

    6e00b8660fc0e7e96849e545a9d37ceb7f1892a34fb8561bef15a0f08896d318c8a49d58927cc45db5336bf3431471b4ecfc0a47797ae1d9e39eb30ecc066c7f

  • memory/1916-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1916-48-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB