Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 15:34

General

  • Target

    0412402c15e068cb92e31bfb109c2a10N.exe

  • Size

    62KB

  • MD5

    0412402c15e068cb92e31bfb109c2a10

  • SHA1

    1bc9473a1f4137dcc93f738187cf11d0b2ab3b51

  • SHA256

    4b16a20d2c2fca0956598f598af6232ccd683d8b94cc1e1032ba7c2e3bb4ace6

  • SHA512

    fb95ea45cc140212f2ade7db3a238d7161a6baedbf697cda9f8390038e4f398d3db5329e4fc701eac288571a37d41b8083d5f00645e8ef565b24fb1ba5cdd09c

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJ1:V7Zf/FAxTWoJJZENTNyoKIKMuBaqBaj

Malware Config

Signatures

  • Renames multiple (3149) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0412402c15e068cb92e31bfb109c2a10N.exe
    "C:\Users\Admin\AppData\Local\Temp\0412402c15e068cb92e31bfb109c2a10N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    62KB

    MD5

    d791c2881edef22df5c4dd19314fcb4a

    SHA1

    c1197edbe2b54de90cccc9902ee9cf80d1cd8bf1

    SHA256

    d1a4088d0af506f84d3000e3d04cee696f4e311720b02bbe954e64bb713e3ec5

    SHA512

    6f4b8226e366e48b19d1cd8d95aa5048aaf9bd032c59b72e7709fb51379957f12b35cc6da52770a97a9353aa0fe8a82d760347cd6d263f55448f38ad7eaa4713

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    71KB

    MD5

    6d3bc042157e6c283d2ecfd2537bae27

    SHA1

    8e7c29d03dff0332b1b4e32f7a41c5f6b4f68abf

    SHA256

    875602048203dbc9eebafa1b18c0977726722a53e99b311d839d795eda94cfbf

    SHA512

    e1a131ac40fecfb11bea390056763c4aa7acdfab241e532eb28bc5ddba459c903a20eff903905f4d8616ffe2d24f246138b23f890e00dc3314670daa61e06c79

  • memory/1660-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1660-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB