Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 09:40

General

  • Target

    79d7816c74a3c3e651ac0bd5a8756390N.exe

  • Size

    71KB

  • MD5

    79d7816c74a3c3e651ac0bd5a8756390

  • SHA1

    f8605de38588333619097501c6f659fe2d23c2ca

  • SHA256

    38b1ac3e9f8db8c0bf5138c676dab8898f21859e45ddfc9353f66f10ba00e6d9

  • SHA512

    d3e27e1be552b156b1328723599617c62160787603c0fb7ce1ba3cf67eebfd92b415e55f805ab07069b57a180bf4660f8b237ce21ebc65fc82a40850ff6f10f8

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8Q8/8fCIqwq+:enaypQSosk7Nz

Malware Config

Signatures

  • Renames multiple (3150) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\79d7816c74a3c3e651ac0bd5a8756390N.exe
    "C:\Users\Admin\AppData\Local\Temp\79d7816c74a3c3e651ac0bd5a8756390N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    71KB

    MD5

    ce4a76cdb19fac84676941c64fbcbcbb

    SHA1

    715656869603e4d8e2bc51549078695b2a62016b

    SHA256

    86114c0c5f6b3768c5fde6efad471d3f27048c822a45e99e1267b4f480fd1ba6

    SHA512

    9778305ffccbb0d30ad2fedf289fb37d8c259365d4b636c3ea42dc79d4ea97d1f516d77a513f2301316a44565da5973dca80f5c01729af46096f17cc61e92a77

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    80KB

    MD5

    d14a3a382ff00e4049f7e793e115c791

    SHA1

    3105e91b12d737cfab1d905204e576b7d8d13ee1

    SHA256

    74024f496a337b4706dee1370ab34e05a6257017f4dbed1ae72807a6b511838d

    SHA512

    43213b48347daa559fca0228d5b62ce782b1e9e7e0225f87fa71d44911ab21f520b0f775a778d38cccb9697628226a4eb1dfeda36d52dab67ca1b279669d6aeb

  • memory/2864-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2864-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB