Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 07:06

General

  • Target

    627bf4a022080b46790d9a8eb01eccb0N.exe

  • Size

    76KB

  • MD5

    627bf4a022080b46790d9a8eb01eccb0

  • SHA1

    4870ac41cbf72bb9348ded1d17fc6feac3a7bc81

  • SHA256

    44b9d67753a34158b49f242a1b7dbaf096f87109c68bc1f4ddafd2a893c5761c

  • SHA512

    f826d1d416b107654d86867a56b8c0284b543b47b804507a4bf1ad0d212f984efc7c5fb3ad3869f9f8131aecc2566160c45b36217991010df33ac490b4903572

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBb7dsXDZklYGCYusulXZemZeM:fny1tED7dsXDZklYGCYusulXZemZeM

Malware Config

Signatures

  • Renames multiple (3201) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\627bf4a022080b46790d9a8eb01eccb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\627bf4a022080b46790d9a8eb01eccb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    38032ff0691fb1379eaf0e7410afd64b

    SHA1

    8db0a12783c53b54ac2a87a9eb349daae1ad90b8

    SHA256

    5e54a75996cb561997928a31338d357966d519a2d480aaeda3eb03e023a97608

    SHA512

    3c1e876224be2594a37e72d2c56d6bc4eb4c43299a0414a2e345314c6376284e8947665e10251e1d585c3a58178696cfd695c14393432fea5cac264329566a83

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    85KB

    MD5

    4b8b9be39f1577e3c12a879f56070f66

    SHA1

    1f4c626e3c4b3e69096a598f1f0c9174630d62af

    SHA256

    68ab7cab95cbcf078c875ea162c53bb3974c6b37387c734e23c43165f2217884

    SHA512

    fc5191d862763cb92d46450cb0588dfb76bee0b1781308d2cea182637624746f0c5742a6a38f259e650dd89f37070321423632a9993b2ba3a50698adce32927d

  • memory/1968-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1968-660-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB