Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 00:18

General

  • Target

    23157eb70ec4d886508f9ecdf521ba90N.exe

  • Size

    38KB

  • MD5

    23157eb70ec4d886508f9ecdf521ba90

  • SHA1

    042cb42e61c445b7f05cb13388121da1cc579968

  • SHA256

    a8382ac71259fa121ddccd6ef1ab27758a93e918807bf90864298e0ee0148fc0

  • SHA512

    f74df4f46ced35426e87467cc7a28c666cef014d21f234ad6d1bc511da8f625fb9ed7ec7245d178804315f89e9d1b14d2dcd428852ac3b457f173df89b019f15

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATBWvyBh85c5/9D9J:CTW7JJZENTBWv36XRJ

Malware Config

Signatures

  • Renames multiple (303) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\23157eb70ec4d886508f9ecdf521ba90N.exe
    "C:\Users\Admin\AppData\Local\Temp\23157eb70ec4d886508f9ecdf521ba90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    91d380b2b6b4e9afa7fe3a1df52d4f71

    SHA1

    0050836749005201875de14b7a4d94f2fa39e375

    SHA256

    e6f5a6d2e9a3d9256d04f291eb99a83893c4f02716b265f00e59cb0fb88e3c8b

    SHA512

    414fd7a324a8b1e6f9a1f8715f4cb36a32cb14168a90823f2ef8be421f5c10c121028f7fdc31447e6f71efd856e32a301279c9684912fda1371229c96e84f04c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    741d18c4e9c918f7094a003dc9d50ae9

    SHA1

    93ee8a253ee704b5ff930a6639f928e06a3dc9cf

    SHA256

    ae6f78def4cb3c75d15de6a60af3547cc0e41a385dc2a1a8a7c010d88eeef307

    SHA512

    8e9a1b84e2daa1ac1980bda1be25686ef706dbd210a6b003c596f4a70d89a7268435c244db708e9e76d2a4ea59d5b5975fea832db8852812106852d5d8f5804f

  • memory/2256-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2256-20-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB