Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 14:07

General

  • Target

    d27272278bdb4266ca11ecb700399190N.exe

  • Size

    55KB

  • MD5

    d27272278bdb4266ca11ecb700399190

  • SHA1

    a4dc6f5a9a87eb4697b3b4adac49f717e6939fe1

  • SHA256

    2a3ab7117871abae2dfcf1624723244d9693a2236ad090ca176019f6f29b05b0

  • SHA512

    22b419db89eba27401b062d3c694df2aa2f11e9d587ccb59493646d9a6b2f3430f7dd83418a9f3a70427878bcc3a23d9f486e0efbd83142c415015d63709579f

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9dlmr9umr9K:V7Zf/FAxTWoJJ7Tkr99r9K

Malware Config

Signatures

  • Renames multiple (3275) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d27272278bdb4266ca11ecb700399190N.exe
    "C:\Users\Admin\AppData\Local\Temp\d27272278bdb4266ca11ecb700399190N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    d6d6798c48b0cb3832d50145b97ca63b

    SHA1

    9e0f3b096534fc3c95a3eedced3e21261185f2a9

    SHA256

    0bbb8af0344bd648fafc8e9d8f7d929d1b5e53e7a5411b02182fb55d1bd4c093

    SHA512

    336c99e270fa8ff1eecf9d3330d784c30c75c38c7af3e534efaae6cf49adb55a9c22d830aa9514248d978d8e5507bd00cb00ce096dcb25c2fb8a144be2881c6c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    b691e46b22237d88d0c9098da26e1e29

    SHA1

    efc35347bc269710dfb12bde8ffd15caecf05c7b

    SHA256

    b7d9403cd3310586ecea2f5cae8c044047fde56bd9b236bb5f81c88174919a69

    SHA512

    d2fc132803a24a7cc1e013b84635bd8f3ed64ab9cb92cb8c7873a6c1b4e8192bb28481b8e20a96c20414f90b84b175aa48d9de45748b83817b609058143560b2

  • memory/2136-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2136-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB