Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 23:31

General

  • Target

    415d786ee5f4ffc0cd8a707d924f7c40N.exe

  • Size

    51KB

  • MD5

    415d786ee5f4ffc0cd8a707d924f7c40

  • SHA1

    cb050b623f8928d48e604de43e107fe7cd3b950c

  • SHA256

    5fc949ddea2b5a7b1e33e22e8cfac55cf851c1b0e874dbdc1559251b1e9e0117

  • SHA512

    0a325f2ec4cc1b563363fc8c03421d999481f1d0d9f0790db87d0a3189d1ffc833585f6668adede05c15b67a8cdcc30858112fee153b9ee3c2c0277ad0ba7f6d

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMc1yw2Yw2SeGUNGUk:V7Zf/FAxTWoJJ7Tb

Malware Config

Signatures

  • Renames multiple (3089) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\415d786ee5f4ffc0cd8a707d924f7c40N.exe
    "C:\Users\Admin\AppData\Local\Temp\415d786ee5f4ffc0cd8a707d924f7c40N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    0503abbfbb278170b4e53f0547b0cc68

    SHA1

    52154befd47a412cd7f4be1503f2819aca0907ca

    SHA256

    f99c7d85fb17e734c5836ab8995dbd9bb2a644fc2265c2bda3643261b87cb8fc

    SHA512

    4bf21ff2986b5d9b5be5000c0dbc5b75978b5697fa3644a4a00e05b35fe9c9d4b38d53bdc1a1531a8b9d56cc2db9a46b352bfda1df2b58eb56f29a2130a39a70

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    1ed10e88c149aaf0e508089a0b1513da

    SHA1

    827119d78f7548683d9f65952da2cfe2a8a1a1db

    SHA256

    783b28b1ace99589e4b0363a811975032b07efc8085446f6701bbba76b7f81fc

    SHA512

    2ac125ee200a7d1385f66ea96ca9ccf2493e55d1068b56fcaf249785643cfbfa054f05912edae987934ab9767f4a604dd8cf638279fe56acc270ba235d3b04fc

  • memory/2248-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2248-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB