Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 20:47

General

  • Target

    04531f8aa932d74b036eb5a8ba1c2240N.exe

  • Size

    47KB

  • MD5

    04531f8aa932d74b036eb5a8ba1c2240

  • SHA1

    15e26a797813eda44de8e6cba01b3ce856daf935

  • SHA256

    445db8da09e7ca87ac6676e74df0607bf82f6d5decedb0b92e1205a5d4282888

  • SHA512

    549b39e862418f4d0c4f688a1973a0c551a5bc2941323ac8fa3ebac0faee8984e097c472ae2fca4b9fb12397e9bb92a8df3d0e347f6aca8d0fb0c01a6adf1f30

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9NoN+OiJGfOiJfoN+OiJ5:V7Zf/FAxTWoJJ7TSbKby

Malware Config

Signatures

  • Renames multiple (3681) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\04531f8aa932d74b036eb5a8ba1c2240N.exe
    "C:\Users\Admin\AppData\Local\Temp\04531f8aa932d74b036eb5a8ba1c2240N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    cd965078e5cd19448ad9210e49bda148

    SHA1

    cfd36c82241dfc031828c2e8b501d0d0381dfa59

    SHA256

    8a0b6e69b8bb876d13276f8f85f466dae69f889e610802fab2adf75cc711202f

    SHA512

    d5e45c76da52c6d451740b702e9aa61f32f0b134f6a2d5a4a311525246b2fd601b2d87f4f849e7d8311816c84c59a280fe22a5748a0f206ec43201ba6664171c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    b1d8bf46b28e5f1527704df30c690ec3

    SHA1

    a564ce87cdc80edf2312424de9cdd5e623eeaf0a

    SHA256

    42d7b178f8d164298bc48f4d5db0ae5a426020c6bbf8a43b5d0f0f0f8d271a4a

    SHA512

    5a0482f4f095a87faa5fbc1d63dd138d11f9c7b14c80a3a8d090d3ae5608ab7259d5a61ffe5365427119476e24fc752ad0c1a31e27dfee0285b2298033f44dfb

  • memory/2412-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2412-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB