Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2024 23:06

General

  • Target

    8d0c016497f46ff125ccc4b2247d7610N.exe

  • Size

    57KB

  • MD5

    8d0c016497f46ff125ccc4b2247d7610

  • SHA1

    72945122745b5d14f409dd2ccb01b73ce0027814

  • SHA256

    b6da22df721266d0743bb17963bb334f7e1f955fce7fdcfc584daf6aab676c43

  • SHA512

    5c3669c5b8142093c1383741cf2256e84b45bf57b2557d935ec186cdb07d151d93db97e438e9f6384f8f73816072a108aad859bc24129a0d698e6126bf2370c6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBWvyBh85c5rJz:V7Zf/FAxTWoJJZENTBWv361Jz

Malware Config

Signatures

  • Renames multiple (3330) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d0c016497f46ff125ccc4b2247d7610N.exe
    "C:\Users\Admin\AppData\Local\Temp\8d0c016497f46ff125ccc4b2247d7610N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    0b5e42a4b16a652e1d83341aff02ad54

    SHA1

    1dc6bfcd347a2f6768ed5f86af05afcc2cdc8993

    SHA256

    4970b82760059292b91e142e06d818a5a12db50162b6f0fb83f3b360a07f9c1e

    SHA512

    5c427de2a7415b65e4943d4a418db57409b40ccad4a6e6e9de43b3d3a3da3f337cdd25d404b7a3ab539dd1bf990869d74430db1b017e773006acec1ee91c8c07

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    754a72a97a1c4a7bd8d14f8fb8e9d224

    SHA1

    bf9cee5207335170d569cfd8bb003c4bd2fb311d

    SHA256

    c39cf0138407c80dd5a5764e9f38f4fbbf00a6db5fb29795abbd8f64c58028fe

    SHA512

    6eb5e4709dbd584c7cf6c45c82b98ba12def407dfc2df5c0ff6b20948e324967e80371b850a36edd485cc59b28b923872d9de5b8758e1d55e1986fcfa874fa85

  • memory/2392-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2392-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB