Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 01:01

General

  • Target

    b92cb55b01e72326bcf4b7ecbf57ca20N.exe

  • Size

    47KB

  • MD5

    b92cb55b01e72326bcf4b7ecbf57ca20

  • SHA1

    4a632d1b9775202cc6a6d06af5ae4b9b9cbe5419

  • SHA256

    bed910c93c060aa5b336a06b7715d2716bcb0060781c3c334869ebe9d1a9fa58

  • SHA512

    b435a285f641e85bf6b5d690f1c5dd6a19871d9007ba53fbbbf7778cc271a7c39e62c7946c719704dd78bc304a2df7c6c0ea761bc3bc1840485b356cb23ce556

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9DJKGJKL:V7Zf/FAxTWoJJ7ThJKGJKL

Malware Config

Signatures

  • Renames multiple (3216) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b92cb55b01e72326bcf4b7ecbf57ca20N.exe
    "C:\Users\Admin\AppData\Local\Temp\b92cb55b01e72326bcf4b7ecbf57ca20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    7b3264c91913d9f6dd7dea05424c4582

    SHA1

    e0e82414093c6681661817d2408a64f8a26d9bf3

    SHA256

    674729480f986aaf4a6b0ed7260b431d2a0415f72dd2839c09ab738df3553f6f

    SHA512

    56a5017b7c069e9843b49a8dc2ae44436360b5b07580d898ea2be6b6ed67e097d641bda382cb56423fe02888b6ecdfc9a84035b7bb59cc8527cda8dd110b5ade

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    b301875964d9217db523c0d1db3f499b

    SHA1

    5efa5df1433a60f5d71e0ee33eccd7133f48c6d8

    SHA256

    0b25446e5719162ba0e9ca1b874865c5c5c92d083cde1c360611896ad94d8861

    SHA512

    0cdeeae4e1df051d9aab7d3aa2766a25f7cdec84f3655fc4df3533b8ecffc8e0b37977809d434a36c5dbc550807df85f1a92e98ec6fc2fdfa945a6c6d989a4a9

  • memory/2680-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2680-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB