Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 07:16

General

  • Target

    3636877721e13f79568c89f06840b2b0N.exe

  • Size

    35KB

  • MD5

    3636877721e13f79568c89f06840b2b0

  • SHA1

    594a1218a69895f2a702831f34a5c14567964ecb

  • SHA256

    006c818d1d9ac6d7057e98fce9d9d5940cc3b0ef8e16d295f335e04a492d9091

  • SHA512

    f6d3dbe7cafa5eb1ad90882f61537303512e9c59ec9bf4f498218495cddd626a9e3277bc1e443b60d2a4d2d7a2da8442892911adc42c34f426a308c3dd2cda0d

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mF09Ub9US5AJx05AJxo:CTW7JJZENTNyl2Sm0mSWbW2

Malware Config

Signatures

  • Renames multiple (3451) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3636877721e13f79568c89f06840b2b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3636877721e13f79568c89f06840b2b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    36KB

    MD5

    5d3c2fc54d51689ebdbe9069625147d7

    SHA1

    de15158e55f99fe52f696e5221b55e133a52ee66

    SHA256

    7ed54716610c759925d559a6f293cf157653fbf9a98741a233e2c667d7bc0946

    SHA512

    d3899bc01064d712da79f8a75f39c84e1bf7f8e20a3733c4379aee6bb168e1b7ee7ff854e9a5177b9341d036743423e157b41f721c835292ceea72607d56c414

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    8a7007b13cd7a106006b8399e71db5c9

    SHA1

    982ae3eed35b2e615a859218216349336ac50de2

    SHA256

    05f3b659332366fbf74efeca263ea2ccb89d6c4af10d677fe9377b39bcabace8

    SHA512

    ff61e43b7388b714a0a0e544ebbb71ee30857af1712ae4b33ceabbe25fe366ff9186cd95a66f1570aa07529d5578a58466213d49271d0934af7458ebaf4cac1d

  • memory/1528-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1528-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB