Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 11:17

General

  • Target

    48c742691e8c1944fc68bf44be630da0N.exe

  • Size

    36KB

  • MD5

    48c742691e8c1944fc68bf44be630da0

  • SHA1

    a2c8041ded913e03eb299e3ed73dd449ad7a7c09

  • SHA256

    0fef482a85d668d5223212f0dd3c2692bb40b54bdf8661ae970e3aface5ed0e4

  • SHA512

    7c4abf4eb7cc2b08bb5dd5f617e716fce7242519001cd64db112a62c4cc9f9b12af2d473bc450f3c25fa0df34a8dce9170990a0dc63aa3b46a212f59733b6a70

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tijcd1:CTW7JJ7TTQoQjcL

Malware Config

Signatures

  • Renames multiple (3449) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\48c742691e8c1944fc68bf44be630da0N.exe
    "C:\Users\Admin\AppData\Local\Temp\48c742691e8c1944fc68bf44be630da0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    36KB

    MD5

    578992d27440c9a1d153a9b3e18cb330

    SHA1

    6e5ed3a35d8deca5febe45104d591e22b22010fd

    SHA256

    fdde8b73a05776c71d00dd8e6d87c4a0f71d07967350d9cbd26cec59f447e326

    SHA512

    913c8d12431591f612937a68401d8747f5ea6ccb3ffea69f704dd8cc8ec47a70f34530bba45bc6348df5682ef1803430082712b49fac9bc44c9ef987596cf9bc

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    5b2daf9ec6e743dc683c8e0759b96c41

    SHA1

    465a21ba10109df14c289c9ab0c9cbdbbe428981

    SHA256

    c3b9745e19493fbe21ee80f9cc69ff39532afac913808427ee8db8c13fcfe09e

    SHA512

    410c9c3a32b4c4cfc531e9eb1533b1f7872d945d198e01c37ae3c70e77365938b380d8afec2c240abf60bc0b845ec9f1766b55c307055d32c831fc94ee55bb06

  • memory/2268-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2268-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB