Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 07:28

General

  • Target

    297f06991298505dbcc2348a928c6cb0N.exe

  • Size

    85KB

  • MD5

    297f06991298505dbcc2348a928c6cb0

  • SHA1

    f62466335dcb3461fb05231d6b1c702a1e31d26a

  • SHA256

    a854a56a00eab640bba65486bc73403b719e5d2371148830f75618dcf598eb3b

  • SHA512

    53ab788c3c2460654786bdfdb9dda8597639d89b0dcec87398db1a5c2624b8e1e5cc06fb97839259da7b0ee86a5d8c6d067352cdbd93ec52163b3f4dd5e7b476

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8IZf2XcqvcYUy4CYy4Cb:KQSo7Zf2XoCOCb

Malware Config

Signatures

  • Renames multiple (3144) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\297f06991298505dbcc2348a928c6cb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\297f06991298505dbcc2348a928c6cb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    86KB

    MD5

    3cae6315571be4445a4b83b8ea4cfcf2

    SHA1

    47276ab15a3ad0d6895b3e65bcf70cc1385a9392

    SHA256

    0ceaa89c49bb98e907568d19e5e05632e1d51d43267183d347243b1af73b8fa0

    SHA512

    f7144d00faa5b8cb18d603d62fc8ca85f48d6dd41d9d00cca008e3e4903212b7e15fa1080c33baae4eb519020430c73bd401d9c4c1eb89eda4e004d1dfd02550

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    95KB

    MD5

    fa28f6f532f0cded6d694becf78eb922

    SHA1

    48bc2481aadf4640ed5b1ed1e870c699c6584477

    SHA256

    b36367408627c38892404c139699bab91d8f1e9f3f90756459acc9da91d26013

    SHA512

    16205bd752d12a53ad89eac639d3b139db3378880fde22c8eb56bb4d1a1e1991949613b488487d74556045bd8309156d8c0708ac6a1d3725954f99fb599c7c99

  • memory/2916-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2916-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB