Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 21:46

General

  • Target

    21388e2d9059a00144b568bea594d1f0N.exe

  • Size

    90KB

  • MD5

    21388e2d9059a00144b568bea594d1f0

  • SHA1

    e2a0398b0b773e4a3b3dc70e4fd67bfc0b976b73

  • SHA256

    42070bf9ef37571c12244c1509c58c6cd30d9ad91e6262572fe0607a074e25c5

  • SHA512

    7ef70385f76cf7606a916c37e0e6ccde61ac27a5d393bb6610744f41db44c4da66b821862a2d7436f912515675bbc4ad906f11d9a289505eaea0c3b12d8f0b0f

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsJOLKc/xJtLJtTGK5:fnyiQSohsUsUKC5

Malware Config

Signatures

  • Renames multiple (3019) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\21388e2d9059a00144b568bea594d1f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\21388e2d9059a00144b568bea594d1f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    3e15cfdd6b19bd4b2fdfc36ebf66323b

    SHA1

    f51e24dbd6e442c7778a9dd29e884339cf108443

    SHA256

    754cb2242041996196753ea5bf509af32baebb038f2c37352582ad8406cbcee5

    SHA512

    c0ccc49b531c357fa0978d23cf92cb631aaebfa2cfce6d01e7ecb22e1b0836f75760a3aced639d68afcb09d6c63d64a720f4ea34868088787b1037cb60cb21a4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    99KB

    MD5

    41dac06f87f11d86fcb4610579fe28a3

    SHA1

    ba8091b5ecb2db4a0860260fc79ac56eb5969f83

    SHA256

    613302ee13b800d830bc9271565caefb7d17189007cc992a5bf91f2d4cea7e97

    SHA512

    35901ca1ddc8f5978bc97d094c33dd0282d05d9d533ab4ad4b435f6326124e12e12f310e2b0663c5d4326892e92c87f7457000b6fa806dfc84aa89cb2195f57d

  • memory/2220-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2220-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB