Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 08:35

General

  • Target

    7d2cf3236228120afdd8417973ebaeb0N.exe

  • Size

    71KB

  • MD5

    7d2cf3236228120afdd8417973ebaeb0

  • SHA1

    8bce24b888efbed48098c02be4176760f054cdfc

  • SHA256

    65bb0b6e0e141f1ac82febe3f45b2365e3dcde18784ac195578d19cbfa97c725

  • SHA512

    ca46dbb80b20e8108df8f5f8de03a53b337385b9b6ef1e5cffbca9115a82985d0fa40a90b13efb6a07c184db9a3372dbbb5c18740e40710b1346f17c3d7a57c9

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2r6:V7Zf/FAxTWxOmO/fxRfx46v

Malware Config

Signatures

  • Renames multiple (3262) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d2cf3236228120afdd8417973ebaeb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7d2cf3236228120afdd8417973ebaeb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    71KB

    MD5

    2c817f18b2137a9b1ca428b802a04754

    SHA1

    ddd342aa7c863ad1b8a31b06f7a7d67a8f4de680

    SHA256

    4b4ff92206effabfce059ad124279481054995b865dbec134cde01d06aaf36b3

    SHA512

    f8d3a50fb729d765e31377b3a55e3f4e1926cd8eacb197b812147bbc63b945c3857fc7bb6f8cce2f0154c391490b6271d02dd626a66daf39ecc0816d99b6a1d8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    80KB

    MD5

    53d3325663e5432fad95b788db465a4a

    SHA1

    c4e3a594ca647f0169b26538f5be9a5f727a9af9

    SHA256

    45bd2ad1b7db167a20d46efb5122ef13c0e4cb29b2f3f15eed3cbf3962a7e124

    SHA512

    eb7a4dae563451c95622f4384e005a0a51607608e74a84ca08078bf3a57882b4843d26da045cf3af7f82d6bb106e10a77d3db8e15315eb5bdeb2978e6c0352fd

  • memory/2636-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2636-660-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB