Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 16:42

General

  • Target

    8742f667213551f5eea4c71179627e30N.exe

  • Size

    82KB

  • MD5

    8742f667213551f5eea4c71179627e30

  • SHA1

    ec40cc0e3b854df64fc8c446c0cc49053fb46168

  • SHA256

    c2a61e77e73aaa9cf88b32e2044bdd36ae319587b4aa143e864f1b1f1625a5d7

  • SHA512

    5918c2d42e00430722d5104bc8ed15ce00abc2ef547034bc14e5fed05d8d580b8f543dca57a7cdc17f1ec4db160caea3bec2b612a5d6589f3d91b9b758c6a02c

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZR9TZi9TZG:fnyiQSo7ZTZcZG

Malware Config

Signatures

  • Renames multiple (3168) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8742f667213551f5eea4c71179627e30N.exe
    "C:\Users\Admin\AppData\Local\Temp\8742f667213551f5eea4c71179627e30N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2540

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

          Filesize

          82KB

          MD5

          5e5dcc60e01ad86283a4ddbf97c4ed00

          SHA1

          b592617a40c0e79a027200c3fc24bf025e4cac3c

          SHA256

          f2b1318adbf3761751840f8a2dc1990c789af127a630b5949fa92851a3980ddc

          SHA512

          fcb5a8dd0105ea1be6cd3051b9ab14e4bb5e3f76523fae62a7906c884061fda0a584ffb1a35729f587f1f09646ff5ea59aa01526d757090bb488eb26d7068865

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          91KB

          MD5

          d6a42fe0539e0cfc1f565a654c233984

          SHA1

          67563b6a34430962b0e4622d93564f571471d1c5

          SHA256

          181dfbbb69863132a9b3f880d206b911f29f4c834f3c6fc29a41de4f123507c5

          SHA512

          a8e8a4e167bcdf5e6eb4b5e92093a8cc3f1db0d761b24a419e310ddf1ef6c1ddf1a719c21391c8a8747e83ee16702a5de7600fc8087bd3eb9a660c99992fc70f

        • memory/2540-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2540-74-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB