Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 18:31

General

  • Target

    8e51904330eae5bcfa13b6742159f8a0N.exe

  • Size

    36KB

  • MD5

    8e51904330eae5bcfa13b6742159f8a0

  • SHA1

    516499c2849e8712552720a9745a25d049d47fdc

  • SHA256

    c6881e3391d157a1c6ff631617d88394092fb098b647a624c1a86309f7fe8c31

  • SHA512

    1a7630938d95caa29c684e9df01ccaaf4bf30b8154044fefaf90dd05d66233eb8684ff2381dae2512430d04203f1d65443e42418038a0ab051c43fbf98bd5a15

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9cGsGWoyoh:CTW7JJ7TyGsGDXh

Malware Config

Signatures

  • Renames multiple (2932) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e51904330eae5bcfa13b6742159f8a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8e51904330eae5bcfa13b6742159f8a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    36KB

    MD5

    86d432db27c8549f2e324cb269456e92

    SHA1

    911a21e290e21a5ecedb25c58537b5ee735c4be4

    SHA256

    05205056d8742b95003aea03f6b60f9e12fa43a6390afc6010e111f826585265

    SHA512

    3fb9fde924822a0869b6ac86c6150a83dba709c52dbbfbc37777218530a0da24ec5f32dd3b8b5f7925eb772a4223fa2d7782839cd7dbd230a7800478fcf2b9a8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    f9cb7ffcfcf047602797fdd1a2eedd5c

    SHA1

    f06a259c07990385043a1635ee684e2c7ad0d9f4

    SHA256

    e9c2c74b8ba7a1ee90d4e56c33e2d89c614eda917b5e1a92786d478673617452

    SHA512

    329b88a6b69cdb0d5d7d7e4106bdf9dbbdd937ebdd7484c0a56c2319562302805f539ba7808370090750c261d4f62a0bb2d1b7fd7df6e59ad7be279b382f57e7

  • memory/1056-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1056-59-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB