Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 10:45

General

  • Target

    30a73c24c1ea61c68cb5fe36dc7c23f0N.exe

  • Size

    53KB

  • MD5

    30a73c24c1ea61c68cb5fe36dc7c23f0

  • SHA1

    8e36fefca16a5877491494276c844505b587fa7d

  • SHA256

    27407326380faf0c70578e6134a209837da294942cedd291066d4de7df1cc092

  • SHA512

    63016600c1aaf0541c8bdffb676be345a8d0dabf8b45d5bc016cc32c8ca1a392ad4f2c0faee0e82ea9fea20a7942e34b59ed101a2adc964ed04c10075c98b0f2

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2r7:V7Zf/FAxTWoo

Malware Config

Signatures

  • Renames multiple (3199) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\30a73c24c1ea61c68cb5fe36dc7c23f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\30a73c24c1ea61c68cb5fe36dc7c23f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    a63a163364c8b7c18c26a9a155c14467

    SHA1

    2302cea898a0552ba107b76cf60daa4e91a18c21

    SHA256

    b3c85c4aa1a6af8016ced8bdd05e96915defd83ec44db8cb401aaf14d7be791a

    SHA512

    42572832f00c859c92eb0a51b4731854fccf18e8a33c022cc70ee85df808a531881dbe7f00de35f9055472c4bb4bdac12b39b738eae68032fc82625e79f2a39c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    5ac0d0e201b6bfd108eb3873f342a8d4

    SHA1

    5073a18e1d0299e8a70977a191c1d9bfcfaf53a9

    SHA256

    57cf3cc0c66ae0efbd6cec651e7ea576b19bc83bb1c1f8071a3edecdbac6d11b

    SHA512

    2e343c0bfb39b3b14748dce907f1560414b0423a34d09ccd4828aafbb62f956b6f33c28dc70709556e5b66866d542346917abbe511872702c808fc6451f5903e

  • memory/2360-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2360-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB