Analysis

  • max time kernel
    120s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 21:36

General

  • Target

    2261791e3b295184d1be43f1c438f120N.exe

  • Size

    126KB

  • MD5

    2261791e3b295184d1be43f1c438f120

  • SHA1

    b9660b58bd497ebbdf8a3b7381572ce3995f0047

  • SHA256

    3988afd21c8e6d4f6c8f4fa0c8681520323c0d388061a101bae333736bde1d74

  • SHA512

    b3a8bc7897d72e9e7f9b7995d87bea88a24898eb13ff4d78b03ddcb2359a0c4d6c15aaadcfb4b854377068c4207d933b1fbc0cebe897f67687b5f15d68420043

  • SSDEEP

    1536:V7Zf/FAxTWoJJTU3UytJfOKI+h/YI+h/BUuXceS4JseKeFdasaX:fny1sI+h/YI+h/BUug4Gv

Malware Config

Signatures

  • Renames multiple (2579) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2261791e3b295184d1be43f1c438f120N.exe
    "C:\Users\Admin\AppData\Local\Temp\2261791e3b295184d1be43f1c438f120N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    126KB

    MD5

    86e1a5c4013e9045db1258c01322037d

    SHA1

    2ae85224ad442ad6c77eb838655e5e88c6e295e0

    SHA256

    df7ceae6e0a1c0320985aecd81d66dd7910119145205f744b2561a0cb810d4bc

    SHA512

    c69afd32b40e43882b5ef8561d74325ca339da3a4a9e62d7684ca56391516d627eb86d522d0d764ebfe6895fed7b0be0773e952b3ab079d7b53c0ca04528ccdb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    135KB

    MD5

    e035773bcdbcdc56266b640bd8217956

    SHA1

    754b733fa78b5655fbca2d03251a2ed627ea6169

    SHA256

    5122c93fe8f332d1f620b3ed21d0c2a935f6bc963351b243bed1c1af816e4cfe

    SHA512

    f65519c098adcbbd75c24766d21c2f98494c19a21c4c8d0fb74bb22bf8d23192646b8dc896d76740c141cf81c1eef9c3befed4916f5cc9cb19cc4295b9d8d817

  • memory/1904-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1904-50-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB