Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 02:11

General

  • Target

    e2ab8f8e3ffa1eb5c7ef90bd58f980c0N.exe

  • Size

    77KB

  • MD5

    e2ab8f8e3ffa1eb5c7ef90bd58f980c0

  • SHA1

    611184473f3e9010bf99261f4ed10f5f832fd24c

  • SHA256

    f0be1651f4737cb16378decfedb7c1cac1f8d27548f1c2f4430516f63f554e54

  • SHA512

    606d3f44231fd9f2378ac009696a7140abbc69a5667155cb92591287c13638d073a00bbb47fc550c74a80fb8aa2b0427b03199d902073d4ff81a2d2475bc7c33

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZc:fnyiQSo7Zc

Malware Config

Signatures

  • Renames multiple (2962) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2ab8f8e3ffa1eb5c7ef90bd58f980c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e2ab8f8e3ffa1eb5c7ef90bd58f980c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    77KB

    MD5

    3564df535d4c823e821635ad75d26982

    SHA1

    336b93c5bfbd1a4ff43eebeab23dba900be1b762

    SHA256

    b0da4f0b3642c112b8b667594d5bc3a2e25c851462e6cd19bbce57d12d80cd03

    SHA512

    ba4295cf9a030dd86f0b5f2a80ca8948a91727ec65bf03df3edfe722a97bcaeb726641b16d7cbb72e9094da74eaf7ab41a31a3729e5e3fd6f64c9286199b3d94

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    86KB

    MD5

    a3057eae7b757d66f247e581caac8640

    SHA1

    6570209b91a85060de1d36fe83773575b1c60818

    SHA256

    622b6fad46faf8fdd874137e1a8e27435b9c8735ddf619afe0e2fc7fa7c83820

    SHA512

    da0f803e8cd380980e98bc3304478c4f060554b814f75a2f604ea5d1cfe1684ff634fd77d483812cde0bcfb6340e67a825ebc4702475eb65d6b09a38581dc982

  • memory/2572-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2572-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB