Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 11:46

General

  • Target

    2e768a9c7a2ef7e8132f1e9fc55d5af0N.exe

  • Size

    58KB

  • MD5

    2e768a9c7a2ef7e8132f1e9fc55d5af0

  • SHA1

    e4101e80a021dd670797213c4742732e7d9efcc8

  • SHA256

    81c6ed542d39dd24085bd6baf9f3fe0723fd1be69cf822afc6e29c3afd99d756

  • SHA512

    7f2d8efdecf4d705f272daa9b2c6e6bddeff4eb631f6f6af3a023d974bebf0e6b336a3110b5e2e32a5462134e546777e77dc9c086279deeac60e816eccace024

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzK:CTWn1++PJHJXA/OsIZfzc3/Q8zxQ

Malware Config

Signatures

  • Renames multiple (3205) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e768a9c7a2ef7e8132f1e9fc55d5af0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2e768a9c7a2ef7e8132f1e9fc55d5af0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2052

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

          Filesize

          59KB

          MD5

          550f5c14840d5a95bcef9528ddd411ec

          SHA1

          a7e4e56452540e9513aef1f792e2bed05c51e2cd

          SHA256

          7d5b32782b81cb5e71f7a3de18ff529e355b7305ce22f020b9ac6825c77bc48c

          SHA512

          3e45af378bd003bbb2942df9328f0fefc1a85c53e8d8a5b6c10bfa509084163b49e5ac7d4926fc9e1619be85cdf56a7883d58240834ce3ae6db4e62ba66e0a9f

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          68KB

          MD5

          97aedfcf046d9a736008213741855711

          SHA1

          0685bf946bd4096e28a38132c534d8eec226adc8

          SHA256

          0244e5a36314bdfd0dd40372dd59218bc96054175277d27be331e6a317d3e007

          SHA512

          4802ea55ecc03a86ceedada9aa0aba4d8b32ab1557c1e38eca18bdddd0b8dc7c47cd3c9fe8fe5df997b8399946fc9568198c19b059728d991b82e93b87def1a1

        • memory/2052-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2052-75-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB