Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 04:47

General

  • Target

    5e832fb9e2826e3f5322c99e1898a640N.exe

  • Size

    35KB

  • MD5

    5e832fb9e2826e3f5322c99e1898a640

  • SHA1

    9da9137f98ff8e8d901744fd4ae10630273d459f

  • SHA256

    baa73ba52f59510c7a33b6d9e8c83a11bf8f119094b560e498f544a669a759e1

  • SHA512

    2198a02d96a189796a7bacdc47ba33d67e2fe4c0293fa1cf86cd2c454af31f2ba4f8f72011c650a498d5f4df1c03102557e27f9f352ffd8ab69670255eb544a7

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9ffgT+i1xrfgT+i1xtAqJ:CTW7JJ7T5YXYh

Malware Config

Signatures

  • Renames multiple (3437) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e832fb9e2826e3f5322c99e1898a640N.exe
    "C:\Users\Admin\AppData\Local\Temp\5e832fb9e2826e3f5322c99e1898a640N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    35KB

    MD5

    54f9c3a40b6618f8a2d5febddb642474

    SHA1

    81737c5aa9ba2ed36111d38062df00edc28c2ad1

    SHA256

    feb28e1ae82f7b5877634d0115cc47642e02aed0bb0a76159aa2ee09ab625f05

    SHA512

    d03b4979654ad61e03b78ce885f5fd99de28afb9030458e9fe40dea5546615b547c3950abe30364734fb028d92025f3735873bc59cb93623b245fb94dd01eb90

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    44KB

    MD5

    d9dd5ffb5027466200a43028351ce3f4

    SHA1

    ad7eef2e67f85137ed45563b8eea5d80cc99e41e

    SHA256

    a7e7bbcb436e56552698511a3b505c5c8dd8608e8acb3ce6ae80cadcb92bb805

    SHA512

    4fe31659a14caf15390d0b99f7cdb82206bb0fd808cb7bc8e366dd2fe88659362b9a16d99f2df569b436246c3bc50f7f21723daaa85449f1583613439e816ade

  • memory/2220-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2220-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB