Analysis

  • max time kernel
    118s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 15:30

General

  • Target

    0065bd069cf70ed83f7fcc1163cd55d0N.exe

  • Size

    39KB

  • MD5

    0065bd069cf70ed83f7fcc1163cd55d0

  • SHA1

    5bf3d35a10a3affbc7dd606bce5e1e15578d3a9f

  • SHA256

    6ee851358efaa71d47e9196835b16a6c3d107aa2751db36b93e183c9131b45f7

  • SHA512

    6f4e2b95b51a661adc1479b953c5fb62ef9377daf22ad60f1581bdbbd6fb5130693638e9745b5e88b6dcab9d88d7ded8c0ea95b53973cceaacdb63979881442d

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0m+s2BGUGmHnHV:CTW7JJZENTNyl2Sm0mKZH1

Malware Config

Signatures

  • Renames multiple (488) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0065bd069cf70ed83f7fcc1163cd55d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\0065bd069cf70ed83f7fcc1163cd55d0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2440

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

          Filesize

          39KB

          MD5

          2bd46c78d9be677d318a71d239c9b2e0

          SHA1

          0a28f2ed381f95bd45e9682781e06c531c8bb6fe

          SHA256

          71b4a28bc8d5fd742b2ca96ec07836b24c486be597c4d06fb845055329080af9

          SHA512

          a49a3b2ccb79db686cd8cecaed5dea79033796bb4fb3379f3ef13db9ba5106f607cd027a028e17d679cbfdedb688ec9e3983cb2b71adc3e1f989055ae01ba39c

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          48KB

          MD5

          0948a53012193a1797d34f7de64d18d9

          SHA1

          8b75b4709cca0e5be92d5a42fbd5bc516f90cf6e

          SHA256

          c3606a1bdd852de59ebb53b721c4cdee24269da0c52ebc8f753c3a652cfe1e78

          SHA512

          d76bccb5f538e970131fe30fd518ea1d952989b32bafd0bb4d137981d70f30051972a536e3dee79b97397fcfbe6fd79f56ca8072531f1f7caa6da8ac504d1ea8

        • memory/2440-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2440-26-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB