Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 21:29

General

  • Target

    055724e070b10f9937e3509b718b2aa0N.exe

  • Size

    56KB

  • MD5

    055724e070b10f9937e3509b718b2aa0

  • SHA1

    eaf5fe1b0f87d1915f3fdcad0c8f96acf649bcc1

  • SHA256

    edf40fa9eea084eaf7376d6da88dc959ba247a2bdf2fa5a3859b0bc312a18084

  • SHA512

    aa65e15930441fb6370e492a0628b351ca7194038e9289b7dff55d304f1853747ffc4ad9677189607282460a55f442d1d00a25cba072bd3aa21c88bee2e341ff

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mKV:V7Zf/FAxTWoJJZENTNyl2Sm0ma

Malware Config

Signatures

  • Renames multiple (3296) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\055724e070b10f9937e3509b718b2aa0N.exe
    "C:\Users\Admin\AppData\Local\Temp\055724e070b10f9937e3509b718b2aa0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    0643d08e02845490f1c736d596777053

    SHA1

    72ee482eb67884b38d63acf2a92d8ae5a28bc9d8

    SHA256

    f108529fe6c08b2a6d95b49bda67c43e6dadd14ee97f3816560ef01f9353a74d

    SHA512

    88a78e63f15e2975463d639300519d38a12d6d1e5fb6035dbdc2a140dfd1744a0e6005d855e397f315bc97284e3f8b5a2bb5b8d8285cefb85f06084cd398d67d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    db880116accdad00076c3b321dc75aad

    SHA1

    3eb63d5e4765b9d08a72da827efb4f63360b5da5

    SHA256

    e91bf6c53ac402b0b1ebd33548e7624cfb33b3dac0b16732bc5612ff0c9d7826

    SHA512

    7fb517989e50e595de7ee931c3e8f320fbe232020dd748f18c928037e743aa34b1139d87d910a06c8d0085fd190233cada687156e80a0d74f750f23148404562

  • memory/2088-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2088-654-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB