Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 12:37

General

  • Target

    b23913897970621e035379872fb4f560N.exe

  • Size

    53KB

  • MD5

    b23913897970621e035379872fb4f560

  • SHA1

    dc646e0ca2e83cc7c97f32db29049730a9423ae4

  • SHA256

    f43293b3b793ec7e897c7cd8950e6e2251cb0261782326a298c4fd946f5f0e85

  • SHA512

    6d41da545d4abddff0e53549c798cd942a1e30d500c839036ec87ca03f1542e162d1227422be76ba56bd11366b2e0317335ab661878630210cd843d883ec2e15

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdo:CTWUnMdyGdy4AnAP4FeUea

Malware Config

Signatures

  • Renames multiple (362) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b23913897970621e035379872fb4f560N.exe
    "C:\Users\Admin\AppData\Local\Temp\b23913897970621e035379872fb4f560N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    b64f21a8a7365095162d1733137c6b00

    SHA1

    9b1b67c014e5f78c3671fad1f4e55e911e9c0dea

    SHA256

    4442ba1a1b0ce57fa2322a47149bf8c34070f1deddf3a09004268a44d8ed34e5

    SHA512

    0d03b438233c957791f71eb3b9407ef2bd3a779dceb2ca4d4e3e010945ec662284c3f17ff33598774f7fdcfba0bd4b2a4f95173b6dda2bd69c02a7d8704fb3d4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    9d339a5de51664dbdcdb30775ac4a100

    SHA1

    7637baf58704a5d8e19e8d3e3e38be36e05e8455

    SHA256

    fd067ef7447513f4993b6e3bf55191c93cd561f18cd9c3161ad1057eca3a79a5

    SHA512

    72b2a99d034ac08f20e5a7c5203feadb1ca2e445b1046f68b14b7fdfed1142626bf82af21bbd8e57181e2211915ddee0cd3ff1bf179443792a890c7787e7775f

  • memory/2364-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2364-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB