Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2024 11:14

General

  • Target

    856e44e06ad805a0b9a654164a106d20N.exe

  • Size

    61KB

  • MD5

    856e44e06ad805a0b9a654164a106d20

  • SHA1

    cb66f87276db617881351bd9256627a2de4aeafb

  • SHA256

    3e0586bd12c6374d5db958ab336898dc08fd8f36afdcf69c94d1030a887a7673

  • SHA512

    0447ac47bed6d750839660bc85f989252a8f6df733ad7eacb31edf9b3d8f53ea02911e2f0fcc9237df5d7e5f03c1f65c6d774ce31c15729e273fc8da29484c30

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rZ:V7Zf/FAxTWtnMdyGdy/

Malware Config

Signatures

  • Renames multiple (3226) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\856e44e06ad805a0b9a654164a106d20N.exe
    "C:\Users\Admin\AppData\Local\Temp\856e44e06ad805a0b9a654164a106d20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    61KB

    MD5

    bbb20bfaa5a68d795e35762bd230b4c1

    SHA1

    5968c05250928948a6b096ab0164c0f4875ede8f

    SHA256

    c660251487ef5a38568f7bc97be35c2fc770722969263add172574460a76f51f

    SHA512

    b035fe8e98f905ff54eda55b4f47b9470d8b9b76f93587b0464149e4c594e0e37485bc3724509c2e1c4d32579ae2500d42c6948bc6d69cc23e3d14cd0f110bd4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    70KB

    MD5

    71ba46a0a6694ddc6ef53bde3b236d32

    SHA1

    cb4c818371e64227272b8818a109b206d45bbf91

    SHA256

    7d48fcf2a30f2d16527dbed391d9bff7cf036e6d958501bb4ab1c5d0fd461617

    SHA512

    c893b0fd75be920309ef2dde60c336869c11ec31de5bb0c5a7fd96b49d9ecdcd02d16298f343a42a2f9ab54b33c286fff2cd033b5c4ce2ca6667be52e4cae2d7

  • memory/1640-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1640-652-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB