Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 00:42

General

  • Target

    7af06e85bb0953820430eedf412cb800N.exe

  • Size

    55KB

  • MD5

    7af06e85bb0953820430eedf412cb800

  • SHA1

    5525190b69545d7336f05c4db409412f6aa94ef0

  • SHA256

    6096e1efc36a7973d1ee658003a699961d33d7d15be8a13c8eba6d17dd5f7883

  • SHA512

    cd70a0b0923bbe13b763a3718a62566438d942cd9798ea48602d7245347d0af2a596af37b9b4be762dbf27acea3a7243a389f5316fbebbe2b2b764db015b33a3

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI97LjLNLjL2ol9OiJfol9r:V7Zf/FAxTWoJJ7T1vJv/GbjN

Malware Config

Signatures

  • Renames multiple (3286) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7af06e85bb0953820430eedf412cb800N.exe
    "C:\Users\Admin\AppData\Local\Temp\7af06e85bb0953820430eedf412cb800N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    d4ccb439d92d37149537f4edddba51ab

    SHA1

    d066d3d89b16e19d98197a28cc08ae5996cbb043

    SHA256

    4e1f2a3f7c4ffb0334e4d66ee86af990bea608dfa91aed02b3d752bff0773895

    SHA512

    44dee04b1efdb5210bbf554264afc81aa7059425f26c9577ccab34dc1cf4ab26019299c0e28c671872d3d92b1f25c0b4b894c79970a1156221bef1be6e59c504

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    ce8e985d0391eb292c31769170663f5e

    SHA1

    8cbc122765a7a39f8d346a6e79e2233bad51d5cd

    SHA256

    31a091a25c90b7dd9a2843e0ad0607144922eda0b644f37e9a621489d0981448

    SHA512

    5f7061297bdba805415e5f6a170a0c8fb2f130459e32efe421dd432b00b9b2d4bf23df64c358fb2adeb494ecaf12da201ce1b7db9c8799e56a5857ee448db2e6

  • memory/1872-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1872-72-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB