Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 14:16

General

  • Target

    2e142fde4f945624ca878e1775e8d3e0N.exe

  • Size

    58KB

  • MD5

    2e142fde4f945624ca878e1775e8d3e0

  • SHA1

    bb8b9ba8528943b6670153bcaa4fdee6233d3a4c

  • SHA256

    29b86bc66d72f809499ff440b885a151f1f493fb30303785dca544a7ee44a043

  • SHA512

    d5034cd3fa786149f090373efd54bda5c50c40c1a839d88167f50a9ae6fff23e42cc91718e6549740ac5e7f48b22f8d5c33f115044fa5c74e04bc0d205f1e653

  • SSDEEP

    768:a7BlpyqaFAK65euBT37CPKKDm7EJJcbQbf1Oti1JGBQOOiQJhATBApwp133Eskmd:a7ZyqaFAxTWbJJZENTBAOIfmKJfmKSJ

Malware Config

Signatures

  • Renames multiple (3139) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e142fde4f945624ca878e1775e8d3e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2e142fde4f945624ca878e1775e8d3e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    718a973b5d7740fb7ee70628a8f8f6a7

    SHA1

    4714ef9a0545420c2a67d9e8c6ef75c7516f33af

    SHA256

    5552138623bbb343632d91e41194109cd694342ae9223087665030531b4dab2f

    SHA512

    6ed856546b83f0a63abb1c2d1147e627708050e530429d15ac20f8e93a849bfbd40f619348247f61dac579610b449428fb6ce2476fc6ad54a5db8b512ac1866d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    67KB

    MD5

    f0b9912704a7c1b7e1927e7e7db617a2

    SHA1

    98204095d55cdd4637b35ef22ee52b2667967f69

    SHA256

    c9aab520f5e94f9f50e3bc657eff4c6d19020e271b4c140158bfbed6bde7d62b

    SHA512

    4d2a9e94ab5e87bb0037412d8e4b3afe102175d8c04f265af57270109172595a40d61576e4f86bd5410837e3ede2933dfecc0381da9888bd61d26c5d725f465c

  • memory/2624-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2624-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB