Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 01:05

General

  • Target

    b46de2b148c773081cbc79e94cbd0b90N.exe

  • Size

    115KB

  • MD5

    b46de2b148c773081cbc79e94cbd0b90

  • SHA1

    adc4d78dabd09807c6801d4a5fc6226834b50d39

  • SHA256

    91ced6ae21b69ecbcef97cb6cdcce1a51b0f2b2e4b5fc5e1e72f151c3f6a0376

  • SHA512

    2f43b68bcb7c5443307e14db5a19d26f1621b70c3bf28e1f39e85bfcb435f3e61f82c027a0462ea5969539fa007b533aeaec13f1e8a7d7fc5815a80d166a37e5

  • SSDEEP

    1536:V7Zf/FAxTWtnMdyGdyNQ4NQ4FTWUnMdyGdyNQ4NQ4pmdGwmdG1:fnyGnv9N9bnv9N9s

Malware Config

Signatures

  • Renames multiple (2853) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b46de2b148c773081cbc79e94cbd0b90N.exe
    "C:\Users\Admin\AppData\Local\Temp\b46de2b148c773081cbc79e94cbd0b90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    115KB

    MD5

    3aa37a87461da8b0352797c8b3e6fa83

    SHA1

    bf3528daba503749c5526ed8feb0811b950d88c1

    SHA256

    730816edc86fc0d5e1cd2ad2c44669dec45d54024247d11d5e2568a99b033fcb

    SHA512

    7065dac6a16d99172de65ebc7e941d7c48ceb7398e3b97330929ca2c1046c27bf39d423a6082a3bed97a8f1af2258439c5fedde7693629e5f2ab0ed60965c10e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    124KB

    MD5

    a6885bf3fca16563324195055239bed7

    SHA1

    60fcb0d68c549098caade8afa8c7c7b6cfa3dec2

    SHA256

    9d12359273e373131875d058bc6663f672291f19f4273087166b945bfc87006d

    SHA512

    bf975483d995f3ad4fd4624850c9c86cd86cf21ba2f6669fd0521f428f9def25e26b5e1764ad7484b49bc869f1f83441a57dd2183f2ace6061e4505a2648e5c5

  • memory/2112-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2112-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB