Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 16:21

General

  • Target

    b2d41527ea473aeecba77e4e0f8e9140N.exe

  • Size

    83KB

  • MD5

    b2d41527ea473aeecba77e4e0f8e9140

  • SHA1

    bac98d3af6ab3c017758ca256070dd8e5fc5812b

  • SHA256

    9d980e9c408f355a9af3f863d32674c8c42602c9a574c07255f546fa0a90c343

  • SHA512

    90fbfb9451c4cb7679fd31d76f437e51a3c18cd36ee7d08b9b1bdc84f2f6fe42e7c183fb6b5950c1d28d5e5bf18e269db22d13f11a38cbda34118b8b8d5af197

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZTkb/b8QW:fnyiQSo7Zgr4QW

Malware Config

Signatures

  • Renames multiple (414) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2d41527ea473aeecba77e4e0f8e9140N.exe
    "C:\Users\Admin\AppData\Local\Temp\b2d41527ea473aeecba77e4e0f8e9140N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    84KB

    MD5

    2365affa9254a27f5732e83bbb41ab32

    SHA1

    c12f7cf8429a8e84de2ebea53fd4e298a251e40d

    SHA256

    9ad228c28b8210ba8a557e377f6cc6908337eaa419b98342a301f82daa0647f8

    SHA512

    b6036260ac5d2876fbef6e6a0a5ad1ec7babcd5fb499b2dc1ec4d684b56b791fc4cb4a0bf9b7c08cd664ce0fd7145847a80b2da37b5a59c42b0c265724066273

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    92KB

    MD5

    bbc2b890b6fdf4c63d5b4c029851906a

    SHA1

    1c954e36b67fee6712b5b7b6160d52f73facefd4

    SHA256

    ae3b8b1627df3f918134c64ad67e296b867fc129be634be54ce4f6ca0b2b4159

    SHA512

    3630972febd83231743d8126a2668ae41a64c962aa71b7ecb0522f14aedeee5c67fa5740db6c052bb41876aa890126bfdaa8c8a31d16a70163b5cafd1df7e2ef

  • memory/3020-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3020-26-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB