Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 12:37

General

  • Target

    ea181e4a327ead15daff17fd25d207f0N.exe

  • Size

    34KB

  • MD5

    ea181e4a327ead15daff17fd25d207f0

  • SHA1

    efe24b071e87e487edff1d7a3361bb1d7781baff

  • SHA256

    35b4509cf212751f53ec1c29419f7a2ff097809a6bfd67c2ae1860f1376f30f1

  • SHA512

    cd25f6f2c9c54cf4c6aa533739868caa54fbc9ff220dd58c184601dba93fd67ec3dcd81b5699dd1405cba05232424a4b3879bfee05bbc1a4ac7626143dc5a7d2

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJ59ADJs3353e353n:CTW7JJZENTNyoKIKMO

Malware Config

Signatures

  • Renames multiple (3374) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea181e4a327ead15daff17fd25d207f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ea181e4a327ead15daff17fd25d207f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    34KB

    MD5

    26db4fe39b2445e62f818f159d9ee8ea

    SHA1

    c74b67fb6b47b89049fee655526f5fe86918ecfa

    SHA256

    1cdf397c6e881c0496662eb2b4fd11e27e0b4dd7a77009b479528d469a828b07

    SHA512

    836a2900e929ffccc7f5b66744c9df92953ad943070320bc0094e8e63685282eacded6b66562d7a1230d2ff95ab6abe310420cce62f37ea14b2577aba91ca8da

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    43KB

    MD5

    7d1d28309791a17a447ad51f0dc0e0d3

    SHA1

    ed5dccec0c5b3ef015570d0af41c00ac178837f5

    SHA256

    3df65b38ae187e16abbb7f5d2900410ffbc04946809cc9941d4a77cc0d378faa

    SHA512

    6bd2cc4d053282e50b7e2143e423afaab6750de6fb0e953ce31c0a9d3e7f2463ce28511d633b4a47dffe424ef841a9bc234136c737036fda6df61119d4068e99

  • memory/2572-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2572-71-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB