Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2024 22:20

General

  • Target

    7ed1f98c791b50eca0a42aba46bcd730N.exe

  • Size

    1.0MB

  • MD5

    7ed1f98c791b50eca0a42aba46bcd730

  • SHA1

    d2b3be623c6c30a0f559540a3870d34613a7a717

  • SHA256

    0e16734ad6669cc91ef422d25fee005bd9c6883f05fdfda06052a211783a8772

  • SHA512

    187f73ee7d58551247f512c9a856369679db36125d712405ebe8c10ca832c989b5a17106b0e55e4ec06fcce54f2c9208bef2217e8080a0144312cc991c99e0b5

  • SSDEEP

    6144:KNQ3RjTSP8ZeVdiZQjRBPCr8YC/htdCfiJYHSxKQjZHFR2W52z8urkL4vL/cAGF3:rj0wZQsE/hv28NeBbUjwG

Malware Config

Signatures

  • Renames multiple (486) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ed1f98c791b50eca0a42aba46bcd730N.exe
    "C:\Users\Admin\AppData\Local\Temp\7ed1f98c791b50eca0a42aba46bcd730N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    1.0MB

    MD5

    c143cb8fd4dc05e422474ef07fa04640

    SHA1

    7612004604fdc6a5c681578b793700e44220690a

    SHA256

    88f1e3f6f02e59608c04a6b61291bfca191ed2dbec5d78fcb3030017aafb8f2d

    SHA512

    a5058c013da19ab6bf62b545a8aca03f2c75c6b3ac519a1e1ed8bb74bc2fa5bd2b5acbc499d136045faf60c2307cd16c06e39d7665c67724c10b11bae21627ad

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    1.1MB

    MD5

    fdb0c1c4d955992097df829148f30a64

    SHA1

    3e200a28a09d46d9f0262c3eae6c0184746c5252

    SHA256

    41de3a4bd47e3c2ef691b10aeb15dadc40201789849335257e76f8b71a09c84d

    SHA512

    235fe5dc38bf61c966e0ca955d88986007b04a262b8eb6539322955b698ca4d91882ddc8c0af1e30586c6e045d95722d7e0024555e6febb776522e4236abba32

  • memory/2604-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2604-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB