Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 12:51

General

  • Target

    ee0dceb52b1eb77cd22bc0a30b6a6bf0N.exe

  • Size

    54KB

  • MD5

    ee0dceb52b1eb77cd22bc0a30b6a6bf0

  • SHA1

    155238b56d2a2f3d748340c9c35ff98aa7c2a6da

  • SHA256

    723c5d146348b355e2531ad3e6fc947267f295ed7ddda215daac70a21198ccab

  • SHA512

    aba979dcc0db56fea9fb4406859b2a6387c206ce8582b2d98be57250b8b3545116324ed1d9cb590385fb469e85dff480feb715b5eacea04e58e79e7e2de78625

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJBZBZaOAOIB3jM2jMHsLzwz7kjk8:V7Zf/FAxTWoJJB7LD2I2IHsLM3kjk8

Malware Config

Signatures

  • Renames multiple (3298) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee0dceb52b1eb77cd22bc0a30b6a6bf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ee0dceb52b1eb77cd22bc0a30b6a6bf0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    4fb4ea4f944b2bbc0609a7b1a764827c

    SHA1

    9f5fb19deb79e10bad8ba431529ada10a2e16eb6

    SHA256

    f67a260524df5e99db935cc1c638fbc699034fbcecc28ca7118f8b946677847c

    SHA512

    c21f81bdb169bc8d4dd998e3d70499345b3f5812e1cc5313d60daf5b09fb3319406305538f26b41da057315fb06621a666cb2e8b90f8cc7d4354ce4df9d4aef7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    e983c5ec4225258bbe1d0b28dc3fad9e

    SHA1

    4699fe17fa748d113dd999fabaa1349fd8cae4e7

    SHA256

    0316be2d2fe9a0300f6b89be49be3e5b7ce05cfdb9e8f08ae70fc89f356aa92d

    SHA512

    8ebbd09c4910435ef8ecd7339da2d06b8a916daf32d5d8999b5ea849e773ccc3540abb9053c9de8f3b9adc1185434342be948facf6c6e02790d4d3940a5caf57

  • memory/3000-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3000-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB