Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 20:17

General

  • Target

    282eeb96717802c6dbaaa744654849c0N.exe

  • Size

    26KB

  • MD5

    282eeb96717802c6dbaaa744654849c0

  • SHA1

    5fde9e6d117e436a29c8786cf4fcb9d731e5828a

  • SHA256

    5bd74eafb961341b0d4ea1d30833478921544ea3838e240c2c47dc74e478aedb

  • SHA512

    141bf8649e06e322d90b85248d84e3831671965e84e79eef5c6192640854764174d1f6ff641f27e6ffe715bcc959f17fcdadadaf71632e5e737e828d85cdc4b2

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9dEjl:kBT37CPKKdJJ1EXBwzEXBwdcMcI9dEjl

Malware Config

Signatures

  • Renames multiple (3406) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\282eeb96717802c6dbaaa744654849c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\282eeb96717802c6dbaaa744654849c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    27KB

    MD5

    6c0bc30fc4e29f5eddf021e34181cdc1

    SHA1

    fc00416aade92407f1044173631462cc957dbe53

    SHA256

    6b43409c49eb02925c3b6098a08267d09007a877e8e699170d5555b07f9e4d1f

    SHA512

    d9227175e4629133803fe722b35370f26f852a14f904f7a34c5955520fc25e4b5d90e5d7b1d2bc851da67a097ca6534ce13792f81457cb5e5d0a9bc722480887

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    36KB

    MD5

    6af99b818e84d8df2baca9ba9f5f7ace

    SHA1

    b0a1abc36c3b2c89b76f087831b347078fed79da

    SHA256

    b89139af0a3de581611db8679bfdd5ec16097456ed54b5861fa70a0597451303

    SHA512

    f4ffeab14f89c6f075442e11a14efb7880826e18c171c24ad2c9d92950862c0f187d2f534929a51f9abfe8058498dffa9a2fb6117973d95415ce38e367f60cfb

  • memory/1560-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1560-71-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB