Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 02:18

General

  • Target

    41eb75cb2a42507a93a531757d7c1f20N.exe

  • Size

    152KB

  • MD5

    41eb75cb2a42507a93a531757d7c1f20

  • SHA1

    8891bfa083f37e4debd16f73c8a5f1457f6b92d3

  • SHA256

    5b878dd638cebdc73449becafaec9509ade1bf9c48868c4906052f45d452c813

  • SHA512

    a1b3dfa7bed3e29de1b16f87baf54d90465f92a92cbd1ffc3515341b1a7b61e69370abd158a84014e000c410d477e050a1eede1196a2a9f1c38317a74878cdb2

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8+g9VyjVySlPdA3NyaM62ot2oxQW8:fnyiQSonPdA9yaMDT28

Malware Config

Signatures

  • Renames multiple (270) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\41eb75cb2a42507a93a531757d7c1f20N.exe
    "C:\Users\Admin\AppData\Local\Temp\41eb75cb2a42507a93a531757d7c1f20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    152KB

    MD5

    9f48a8220f799985d50ca889c995e180

    SHA1

    6f3c1e89bdbe1519ad24e38f0da91830c1e35d53

    SHA256

    550e85ecfd5bb71370c2116b8aebce96560435424c89ee62c566fdecb7b1ebcf

    SHA512

    b67e3aeea5dd81f60d5d976df10411d0abbd233cf7c9c4d4be6b3a72b741bdaaa6fa35f34b328e890a7d0a4dfcdacb4c47fa28c3e9af508ea9e51d67b4cc6f15

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    161KB

    MD5

    d4be6e784c9fda6c7a8e011b8908b04b

    SHA1

    2271dd4ea8cb857ee9030e955ada43f99517313f

    SHA256

    c70428dd9646da1f2876f5ef839e1c34e41666d0c744a701ca57208afc4a09b5

    SHA512

    a6c33d1beb10abb158aa5277739d82106328345ac808bf87061ea254f274371acdb562fc4dd7209c36d797a82f566472eee235191ea585d3899c3a314c9398b1

  • memory/1624-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1624-20-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB