Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 18:52

General

  • Target

    24f8f0e2d8c03c6c9957f32b2d1dfc60N.exe

  • Size

    64KB

  • MD5

    24f8f0e2d8c03c6c9957f32b2d1dfc60

  • SHA1

    9da63a04d91948233ffd125ad2777d825a888403

  • SHA256

    8b7824298fd4e2511b916839a16ef033dc9eda0dcad5196ad57cbbd69c18cf90

  • SHA512

    8a74e654ef490520d850e5abc4326daa608b3dc40b0003f1d6d978f3535ec2344120fa23fdee5f640dd2fae932889267837994ead8a5269f498952ea1a084754

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJBZBZaOAOIB3jM2jMO/7OSbo5+Oi6Jfo5+Oiy:V7Zf/FAxTWoJJB7LD2I2IbSq+n

Malware Config

Signatures

  • Renames multiple (339) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\24f8f0e2d8c03c6c9957f32b2d1dfc60N.exe
    "C:\Users\Admin\AppData\Local\Temp\24f8f0e2d8c03c6c9957f32b2d1dfc60N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    64KB

    MD5

    efa6c0a8b970e6108659693b02010356

    SHA1

    68a5551712510d3ded04d7b085a6ab146af4f878

    SHA256

    d7070b63fbd3d82bba944f37d73b961f3b6df05bb071cda307aef4b9ec2c4d9b

    SHA512

    e833a642f725dfe3a546a4f7c1961a17969d11067e6f2f9b09fce1a817eb1d36f41f0dd923d44514ebbc9137e757dcc89c9a06ed42d9bfaedfceac3378bd2885

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    73KB

    MD5

    8f351fcda191c26705a79d8de17e9206

    SHA1

    b99def1e79e7730bfb7f94bfdd33aa8f86119721

    SHA256

    e91c7fa78aed47067ee316fe0035a769dc99cd23b23603309670b442a5b2649e

    SHA512

    3f69a6c57e24f4152814f077791da9c41d8217dfe601447fd44e4c1d3a8ce7615ec03ed8cf951d5408900093f39f8594022cddc753a4c6470c95660446bd5256

  • memory/1968-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1968-26-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB