Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 03:10

General

  • Target

    07b5e8a398f5ed985102da0cce52fa40N.exe

  • Size

    56KB

  • MD5

    07b5e8a398f5ed985102da0cce52fa40

  • SHA1

    3cebd492ba6a772668f643b57a21b387da2cd066

  • SHA256

    10a5d37faad21303f6e1d952fa4f1ced81215d70830b3700fa61ccc5b20fdab4

  • SHA512

    451349a3e183be03383818d565e99642e5337616359987eb8a870a6d5b5cb301746c488b0a9bf151328f2d6d0f94f80565f1878001426ce3254cc56fbcd3e953

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFW9:CTWn1++PJHJXA/OsIZfzc3/Q835ufF

Malware Config

Signatures

  • Renames multiple (3216) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\07b5e8a398f5ed985102da0cce52fa40N.exe
    "C:\Users\Admin\AppData\Local\Temp\07b5e8a398f5ed985102da0cce52fa40N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    f1955518c5dcc8c76eaf1172cfcdd019

    SHA1

    d2e74f634170413393247ea28c3fbbb31d8c9f32

    SHA256

    8411658d65a7bfee8ecc39e406423af79713596f52202fe231ccbdad3aa6a92c

    SHA512

    fb3325e62cfa7423b75014282eec8041420f20c7c103c6e7dbae643e926ae62a01ecbbe2632d4209aaa6bc411cea1989731fd84e0fe33097e33fb6c34c5e7311

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    487fdea6288193a60a666c7bbee5d072

    SHA1

    7fe17ed5d86cc37922f614af7c3580e4bfb758c4

    SHA256

    c8517e80a3a5eff53abd4862b55223419e027310c4ef8363bf40676b3fb97916

    SHA512

    118538071ff683272c5a917f331995ada6ddeda65a9716b9253e1f64403b5857d5ff9b5a657b208413769b1199a324ff76d36689d1f8ee29a0740a529f5715fe

  • memory/3028-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3028-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB