Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 13:47

General

  • Target

    3a330b83b51862e816889c04021d29c0N.exe

  • Size

    169KB

  • MD5

    3a330b83b51862e816889c04021d29c0

  • SHA1

    543ee9efc74960dc9f980e10ca384c14d51ddb0c

  • SHA256

    864aea20d3667e2b145e3b0e3df3ef335c58afe50c7706855c3972ea175ccd37

  • SHA512

    db6ed4b4239c1818ef593d8c4cc3d09c9d9a08e649080291cbba2073441fffa8b31a39fd10ae346118b78afd28c924b4aedbf1e6f4ae5d773329f5a6cee0c0ce

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8zx3Y3hx+fsio5UxKzWZ64+A8C4bwc:enaypQSo6VEio5Ua4Nw

Malware Config

Signatures

  • Renames multiple (2802) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a330b83b51862e816889c04021d29c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3a330b83b51862e816889c04021d29c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1964

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

          Filesize

          169KB

          MD5

          b56f9e8f7f80ecabf4907c821c36e6fa

          SHA1

          ef1f177e905a3949615d407c1c12613ec3c55a93

          SHA256

          f9dbf32fb2431d50cdb884a20b63b800f322b0c41051e672b6b0c97652578667

          SHA512

          4b598e417e578fd5244d4398a2ccbee414654542a5343ece88dfc62f4b46f14eac74fb3c928046c2ad88cacdfb142996ef0bcbf57d952522ee6bdf61db5614e5

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          178KB

          MD5

          a18439c2724d735384ea949453b0046b

          SHA1

          afd913981838c7e70f9261edcb4233a5f540d848

          SHA256

          00cbee6be1403a9491ee3bb6c7956a4736f513fb5d4dcd1856017180f47468fa

          SHA512

          18ff2e016035f51528e846840359143b66fd317cf36bc8b7969567dbed5317322ed734883bb154cad1b08fff07bb1f93f4780535cafe72119e61614f0b74178f

        • memory/1964-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1964-70-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB