Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 13:44

General

  • Target

    8e2d67b366b34bc1b2b69edbbbb88800N.exe

  • Size

    46KB

  • MD5

    8e2d67b366b34bc1b2b69edbbbb88800

  • SHA1

    0eb31110f46b458492a0c695dcf4429d8846e0a5

  • SHA256

    66119fb9e79a1af91e6c70485decb7f2228b858b05828e81a2742e81dd3c17f8

  • SHA512

    3d0450be6fc0223af3be2e7054bd8c84e0a828c6d5d5c586e50a1be1e3455cd3a7f262878a6f6f941995adb0a79d29c53b39c4e285fe78d273f5963818bd91c7

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdA:CTWUnMdyGdy4AnAP4N

Malware Config

Signatures

  • Renames multiple (3222) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e2d67b366b34bc1b2b69edbbbb88800N.exe
    "C:\Users\Admin\AppData\Local\Temp\8e2d67b366b34bc1b2b69edbbbb88800N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    8470e1c11b9a16b682f6418a86a5c104

    SHA1

    f88f4d0a21b5be78e71f229588e6f4e9ee60da19

    SHA256

    d39829fb05b80704e2c4b025759823eb85950b0780cfeeea206fc96f2741ce3f

    SHA512

    520ede6d7430122c7433a68a357fd98cf847ade8b7fa6e104e577b1b3da3305f5e54d3af4fe177ad345a4ad620898c8076a95b2cb0323726ad8fe6a6c600ba02

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    ea0df499c301a3966e9d10c7a2339fb9

    SHA1

    46d5d341209545253ca1b464615bb8d74fd74acd

    SHA256

    8638087d11fbf99a96464691d3444943301a2489d06ba79a6dc1d101c1d15df0

    SHA512

    ae0502bd316d6bd2b53ea7c7fede8eddfa5a7dfdbc90542619070a6be2a70095a8ae493cb53435020b2cae1e9f723865c62b065b1132657188c6ab20b7eb6131

  • memory/2900-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2900-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB