Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 09:01

General

  • Target

    1476ccd8fa70c5b3517296968f6dd100N.exe

  • Size

    58KB

  • MD5

    1476ccd8fa70c5b3517296968f6dd100

  • SHA1

    492435d38f7e8c9bb44e6d916b776fda1eb8b256

  • SHA256

    d1b9db6fb4b88860d4ff950a3e6eb7aa832399b69d888db11cc1f9091cdd7cba

  • SHA512

    2a6cdc74fe95e26117896f9acb40ee2312435f2694ba805c15d4d94e7ada4d27927f78270176ceb33d08c1121e9b84f136ff2c9e207c03592a0f000bf942a205

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJ9:V7Zf/FAxTWoJJZENTNyoKIKMPkG

Malware Config

Signatures

  • Renames multiple (3256) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1476ccd8fa70c5b3517296968f6dd100N.exe
    "C:\Users\Admin\AppData\Local\Temp\1476ccd8fa70c5b3517296968f6dd100N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    847404c24d4c6673c5e3f06034c325f7

    SHA1

    23ca3e21578122f79939ff323dd3148c6f58996c

    SHA256

    62d0b293f0560f4dd374511f7a9bda4bbcf19ce26aa74f17a328ae9c057ae49e

    SHA512

    309763df04d81a7c67458cf5e78509e144b47bd28e6bb0b39e94ae1efe01561bdf7c014b8197e007067b591cbf44e2d0622e49ea6dc9e729facbc4506441fb18

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    67KB

    MD5

    d7058103744a6dfda85923cb63cb1def

    SHA1

    f26961fe8a081e91be27cd9f9da3ea480dbc3d7b

    SHA256

    6fe055b5023ca596fa182bcaa9573781dac880061dc412b6fe02bdc303aadd0f

    SHA512

    b8825449600732d65e234c231eb808a01783016a50cf7e81f0c769a342cb71328eb9e23a241db264b67d1613bf25a3b03aec8cf3525b4f04872d9e9fd90ccaf8

  • memory/2416-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2416-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB