Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 04:28

General

  • Target

    2e162ed2de2fb51dd67527374d1d5020N.exe

  • Size

    52KB

  • MD5

    2e162ed2de2fb51dd67527374d1d5020

  • SHA1

    028b8a89abcda5e56e2f408ae6359e8ab3d160cf

  • SHA256

    badb1e98980a077b8aba10829f68cae93c73c38096c564514c2f151b5520a8d7

  • SHA512

    8b8b3c49d06628a696852ad2e6a2847eb167f360ba909d9c29506de86969a781a86d6d0a2b6f81ca1cc46972b5ece58d8870bf4a270d502c839d9e2406032ccc

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9DJKGJKTEzli1xcEzli1/:V7Zf/FAxTWoJJ7ThJKGJKTfQfR

Malware Config

Signatures

  • Renames multiple (3344) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e162ed2de2fb51dd67527374d1d5020N.exe
    "C:\Users\Admin\AppData\Local\Temp\2e162ed2de2fb51dd67527374d1d5020N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2556

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

          Filesize

          52KB

          MD5

          9edd79c5ce55c8bc8064eead128f2a21

          SHA1

          c903dc1e110a442d5eb8f1ade7907ed7eb2bba91

          SHA256

          de6e11121e24d03f104a15d76f160202856688f0bc57942dd3c58b1ee58cae8f

          SHA512

          dc2f223cefaa86a48e84e597f87722801d2079b18a9eb0d6348ab478052703085e825eb4a1d0b95cfc945741df574d430ae626a57fa18f853cec34d7fb7d1136

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          61KB

          MD5

          9bc469e555a712fa7f3a8769d8cb2bcf

          SHA1

          3c2d9b018acb996a3b73eda57cd6f78266e0b4e7

          SHA256

          64be95654c6da7d070e7c31b5da0c3975b5ac8e13a3c413dd1141dfd01ef957b

          SHA512

          a8a58f5e0d31050670778d8a60c576d6b9311e5f469c5be7f656b07f35e74a593d5d870403f53027fee0f9e9d2056a34d10ab14e44c91ea4f1c11178e1d9a2ec

        • memory/2556-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2556-74-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB