Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 03:26

General

  • Target

    73ea0b2f54a5bdf434f7ebed1a8b7930N.exe

  • Size

    23KB

  • MD5

    73ea0b2f54a5bdf434f7ebed1a8b7930

  • SHA1

    37f01e89ea30182857d7164662b286a0517e4799

  • SHA256

    5ef6280f35bfdee4e88c114256c1ba5ac8925f3b7ee40f9467385c07ea2a8eed

  • SHA512

    49b4ac0a38c4bfe00db21dd502e846827cab01dedb8fcc53637f20366eb5e1b04607946e571981263b4dd73fd562516708e401e1abe999a6acc2809a8d44f680

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxmDEFEo:kBT37CPKKdJJ1EXBwzEXBwdcMc0

Malware Config

Signatures

  • Renames multiple (3222) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\73ea0b2f54a5bdf434f7ebed1a8b7930N.exe
    "C:\Users\Admin\AppData\Local\Temp\73ea0b2f54a5bdf434f7ebed1a8b7930N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    23KB

    MD5

    ba1de5cab0e2826044b49407585075fb

    SHA1

    89c6650494e118c7042accc5779f391b6138842f

    SHA256

    ae33bb8ba4b26930b306e3ccd85dffac35579b5c0ae5c68a4ab418e6d23ad633

    SHA512

    b5c6ae843c8513e84c16dc3e7b6ad06707c23e65b60bbfa8ac474980d96f30d583d0512b8a22328191dc98fe1e5478d8e1b7678125dc3cc798f05d1c04ad5a9b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    32KB

    MD5

    cae641f07b1527c7820dd16890c61724

    SHA1

    4921e168fec1de7ba450d61d74a9a61ec755bf68

    SHA256

    14540b61c66c320c47ac1936b508f3440c83ca2407ebab8504d1034207b47bbd

    SHA512

    76962c61857d433826bff0e4e715b7c8d0f8a339aee5c318620570b73fe4f49f5ba42c246150dc733fc290b8e5a8ceb1c73e5072add11feb0cdeaaf80397d3bc

  • memory/2528-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2528-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB