Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 22:42

General

  • Target

    14aed829459d09cb43656c52398007e0N.exe

  • Size

    47KB

  • MD5

    14aed829459d09cb43656c52398007e0

  • SHA1

    e4b7be314bf92c6ef55c9753bf3ab42f49bd6632

  • SHA256

    4814714af2d73bd5f7778b9db5a71705984e904d8d8c53914d84204034cd9e5c

  • SHA512

    2cb27259f561bb07354b46acff35b52602a8edd964d9672d21aa16bcc13271a20dd1292b73910c82276402929b828bc2255c7daa6191c1a4c156ac1c391b5240

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJXGiXZqV92N2X:V7Zf/FAxTWoJJXUVYoX

Malware Config

Signatures

  • Renames multiple (338) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\14aed829459d09cb43656c52398007e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\14aed829459d09cb43656c52398007e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    3d3ffa4611f027fd126d65e8d36f33ce

    SHA1

    5bd67170dd3b03e043c705ebf1a02d738166437e

    SHA256

    e95fdfceed5f4843e048c00ad763071a044d8eb9a4f2a0a27dc24509577a5fd5

    SHA512

    920d2cdcf0e2271ec3575a48d6fecc7e7de0a4a612dd6fd40c52fcf1ba39ff64f7b6e71b0302898508fa5029c6e7bac347c3629201170f4b0a8760325870a6a1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    3765a8a2bac3ad998115383df636bb3f

    SHA1

    cb7dcbf8265c22e19a88424cdeac92f5c228e748

    SHA256

    61ade8532a77c99bc0326410819b1369f63c6603281c1aa0fa0c43c5a311cbc1

    SHA512

    0d031572861545131fd5cf1889441b38d042fe5d8567126fed1b1daaaab77bc339d0ba665a49d26ef1de7634377c6002eb856e5cdc52eaae7c3dacbc8ce0ec48

  • memory/1932-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1932-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB