Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2024, 15:09

General

  • Target

    abf5ad635e9b800559b83b1934463cb0N.exe

  • Size

    59KB

  • MD5

    abf5ad635e9b800559b83b1934463cb0

  • SHA1

    060c110ce2754be6d4b38ba8d090f4ed8e3fb2c1

  • SHA256

    2a5ad83e7527a784f314f4f4a9f5667f5ef468d4a82a4e4a0f0b32147d10d6f9

  • SHA512

    f413935efdee5b6159f51aedcb0f8e286018e1f706d84ec4887618a1c5301cabfa0639374b40e2903b90ac0e2e77fc6aa4d8b263e8765eada518988b8a3648d6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJH:V7Zf/FAxTWoJJZENTNyoKIKMmrs

Malware Config

Signatures

  • Renames multiple (3275) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\abf5ad635e9b800559b83b1934463cb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\abf5ad635e9b800559b83b1934463cb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2320

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

          Filesize

          60KB

          MD5

          84c8c712a67075b8140c2df378aea216

          SHA1

          1f20d183e247a35e27e6b82cce7cbefc85eaa763

          SHA256

          de6a8e40f1f29cc5c6375ac9d3e3d58bb2ed72c612be284847392df0ff6dcc8c

          SHA512

          97684a411e69a021df2f6c95a26ff38a06c139df4a120639f44e67c659db150a0fd69cb9fb5ed31342cbee80880c1b5fc048c46e3a274d1a432cd7abf23619be

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          68KB

          MD5

          00f44be0e0f392caf96e0b6695b93c9a

          SHA1

          0e16b585efcb7f23b6dc1260f97607e57d0e0b05

          SHA256

          e879552625b73285145fca42e0d66b263060361ed01f5b51a75a4f00cff4ad0a

          SHA512

          e3a29fa67566c2feb822ef997a4ceb113f22f4fad90fca894f61fd937848d8b4e879a7a08d435cdbfe794979a7ad89e2ee3e5529571f62c57deb3e79500b18e1

        • memory/2320-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2320-74-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB