Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 05:42

General

  • Target

    803dc62a4b1e4c9ff731a6ae81ce48a0N.exe

  • Size

    79KB

  • MD5

    803dc62a4b1e4c9ff731a6ae81ce48a0

  • SHA1

    20e17b090b5bb1d8ab8ec067021d0d7d912349ec

  • SHA256

    b9893d34d60ba48f8e616a13c79a65eb6e06419ae3d081cc7927c75d6a15b01b

  • SHA512

    ab20737da0a7d457cff20506f90a3b056578677489262f24a17fcc729ae7dff6e0f43b2e3446d5eb1b6bd700dfa0a1d46ff416d8798ef8179f6b68bd44639d7b

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rV:V7Zf/FAxTWtnMdyGdyz

Malware Config

Signatures

  • Renames multiple (3143) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\803dc62a4b1e4c9ff731a6ae81ce48a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\803dc62a4b1e4c9ff731a6ae81ce48a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    c1c132b8103176bf16cdd6d75fe7da41

    SHA1

    72fbc8e60cf6ab0b361f4b1bb1f708cd758dce20

    SHA256

    f8aabfc7aa7d026f33cd7151b76c44b1f8e44a72ddce01e2239fb1bf8dfa5373

    SHA512

    cc11ae7f6ba6a63e2d712583af179d020d755388ae73bf193cd1cab2e1c262373d7d630cecce7f526ea8fb609e6b3fed6ae7f437efff758e9a6c022cbb96dbef

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    128859ce7b83731039f8a07fb7a69385

    SHA1

    008e8d592503377062f80b8bc5bbf093eb541c5e

    SHA256

    08782553b2d98a7ad2fbd52113ac1ca515485c97009e0ebb01f651a94758e407

    SHA512

    445cd21fcc1af5d13745d6e708bf1feabcd5373101d5cc9596b77e313d8bbb5f93799972d7cb2de44f2e6e200300ef1f0cc909876878e8a26a12d34bffbbc326

  • memory/2084-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2084-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB