Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 03:05

General

  • Target

    19cf1eee6a6f30d5304daa707fc156c0N.exe

  • Size

    40KB

  • MD5

    19cf1eee6a6f30d5304daa707fc156c0

  • SHA1

    bbe0cab80057899243caa4531829a34edbcb67dc

  • SHA256

    00be3f4b398c08d4f4e7650c2a44bb450cc5b85b4724f4943b92bcdf29a20ad9

  • SHA512

    9c82bbcead67800993f382ff8f1825b3986def65307d903144ad640877175b89ccf625922e62a21df9b41291499f5e7af01be17bfab5ed321359faccd32b230c

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tieiV:CTW7JJ7TTQoQJ

Malware Config

Signatures

  • Renames multiple (3389) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\19cf1eee6a6f30d5304daa707fc156c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\19cf1eee6a6f30d5304daa707fc156c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    9d3811796e7831cee0c2474aef84cbf5

    SHA1

    38e94207d95d8b295e5ef027c51e70e7da172557

    SHA256

    e3621a2ef4a3a6e09649281bce4f0401e996cf0fc44f469e98b89a97072423c6

    SHA512

    aea8105557f674db93af7c5df46d6d0f34735b76fd219bb5a165597f874b4d966d30e1cb974c404235b1582bd6667775f78d541ef5f4000770c177a77d776a09

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    ebc1087a8341f38db48d152e04631762

    SHA1

    874ddf60aa804549b4cadfa93623ba2cda7ae171

    SHA256

    9bbb6ecff663ff3328c7c2fc4892dd4f432ab5fc9de1bfcaba3cdc6d340f71fc

    SHA512

    345f58caa73d3f05e0cf7bb0f64ee4bd4a701006e9e45a9b34fea618b6ab905834f235cb55b59d65662bd6cfced3794061b01ed11c2da444755e98320d868dbf

  • memory/2068-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2068-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB