Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 18:22

General

  • Target

    16dff8bc7961e4b6a64cec93fcb80540N.exe

  • Size

    33KB

  • MD5

    16dff8bc7961e4b6a64cec93fcb80540

  • SHA1

    87a5c36bf285ed1bf30a3533256572bc56239e06

  • SHA256

    3f592f5fb10f63081efcb866540f9f1e9d5db254f77f7b8c03fecf0f36edafaf

  • SHA512

    5247296bb9b08d3fd2fac17dd57a4eb786a74152b6ffc6766a729900af089149c56c30b334c38b464c52eaa38aae7ca9c3ed38c117d472c3af0ad2063d472146

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJPbUSzsOVCjT+:kBT37CPKKdJJTUNOQT+

Malware Config

Signatures

  • Renames multiple (3353) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\16dff8bc7961e4b6a64cec93fcb80540N.exe
    "C:\Users\Admin\AppData\Local\Temp\16dff8bc7961e4b6a64cec93fcb80540N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    34KB

    MD5

    e8583c4a3fbcba94bca24005deb70f90

    SHA1

    dc6ac7bde1c10da3cd0fc7ab96176f48ffa5d7be

    SHA256

    a284a7ecdf10e5a2e796c180394aca5fd0de95b92ff5820942a73a9cc7f64ce0

    SHA512

    caa97c7d2859235a919d4bccbf0a7d57d96805489d84114f6bb55b63db4fb7313cca965c376539049df64e05c97ff3fb044503fe7a8a82cdc5ecae4ace43f16a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    42KB

    MD5

    b7f49dcad691d008e4a9ca86924f2402

    SHA1

    b7303a8dd7eb7911a260084929cbba8604aadee0

    SHA256

    da396cbab9c78aead9b74e12e33fc01b91abfe22a2f49cba730e6766a40ccf55

    SHA512

    e392e9b2fcf1f521f6c2d24c1e09946067ce62e3eaabc323a9af803002e73953bdc6c303601e00fa3f169176e6947923ea0d4c1176bf792994f803a4d1302eb5

  • memory/2316-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2316-69-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB