Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 13:51

General

  • Target

    803a180197b07d28e5882079ef866fa0N.exe

  • Size

    43KB

  • MD5

    803a180197b07d28e5882079ef866fa0

  • SHA1

    b0d2f3828cc2853f06311bba112e9280ba00f6d9

  • SHA256

    4a876793b3435ee0d38b88c73339dbc5b1e794ad9537666ab5827d0863383c70

  • SHA512

    da03905ae799963c0eb7d4f1c33c4cbd04b1534ab6509389d4f296c734d7ffd3353355f96f4b1765761d7c7a32e8728daaa8bd62d67cd2f88a856c0643f8f21f

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiqQT:CTW7JJ7TTQoQqQT

Malware Config

Signatures

  • Renames multiple (3354) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\803a180197b07d28e5882079ef866fa0N.exe
    "C:\Users\Admin\AppData\Local\Temp\803a180197b07d28e5882079ef866fa0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    a7e9a3cfd17f3b45e7686f452210cded

    SHA1

    292c8266c85aedf068dd88f0400ed5794d94487b

    SHA256

    87f41a1e8c597c944ca99df3e709c10f53999a8f9e3caf0ee3bbb8cfa5567778

    SHA512

    bb2a6bf84028f3845b857b6c161b1c4d63c317c7e92e41f43ef072c77f47d62549470b297d711dbec96fdbdf4901644ca1638aa183250fd66c4ce89264d5860c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    0bc7c0652a931558a79b7d01e5e1d5df

    SHA1

    a4075da3c3ce6c20d7ad35a8ed9216e0507ba9a5

    SHA256

    75905aa85f15e9c073e09421ce419c3ec88d1f21183779432b5e9d335df6e669

    SHA512

    b988b885f591cfd344595466ee318de2f4177aca7d214e83503e320b072894bc5f33e8dd3ac7dc21b148f069c00737af4ddc832503dd217b994f8605c63b1022

  • memory/2584-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2584-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB