Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 10:33

General

  • Target

    68dd5191379b300a60a7d526f9c57dc0N.exe

  • Size

    41KB

  • MD5

    68dd5191379b300a60a7d526f9c57dc0

  • SHA1

    1443628566c0eae800c8881868669f73872d5248

  • SHA256

    1596a48f3a41b38b93c3a446a237506b481aef8886a3f049cb3fbe119349ae51

  • SHA512

    99e4cb150383c116149781f88c6916010d6bd57deeb81aeb78c57d1e8d01245ffe81a852657a9f1994c9fd4468b7e38acbeabf7f63084d850498b2b3b0a55cdd

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9yiZEMry/ZEMry0:CTW7JJ7ToP4q

Malware Config

Signatures

  • Renames multiple (3336) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\68dd5191379b300a60a7d526f9c57dc0N.exe
    "C:\Users\Admin\AppData\Local\Temp\68dd5191379b300a60a7d526f9c57dc0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    251071138007451047b01f82dfd07747

    SHA1

    8717010987390953e09c942875bfdf8db119fe72

    SHA256

    25dc847a6778ca039f6ecfcbe20ecd20213d3b54a172f38ae322ea77bed2c537

    SHA512

    1603c4b006bc3d8e871f0dd43bdefbef2ba315818ce82a467215356567983a84f16c6fae3927df6942c326bf1bb3040579907b61fe40930fceea02614f487733

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    ed755761689857c952893d0ab78527ee

    SHA1

    59739856817e2cacd24473568599c18575413ca4

    SHA256

    e7b4628cad47875365ffafe9ca45b4943ac8e65dd1f1881f88002f984e01fce7

    SHA512

    4788e25ba52eb386aaf62d28417d7a32af32566932f2d85ef0603eaf08e92bfd789a11dc67d84d1010d4fa4d397f65d62fe00d693c257e9d8b93fd90131d2bc8

  • memory/2400-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2400-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB