Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 05:49

General

  • Target

    23db8503f4c62884e3718d1a162efef0N.exe

  • Size

    37KB

  • MD5

    23db8503f4c62884e3718d1a162efef0

  • SHA1

    e2cdf5e892beffe1ceee7e4543e22e6550f448d5

  • SHA256

    a7ad3fe084bcb0922d967a8154cc7eab8e03791df69475153a0d3f65f78eb26e

  • SHA512

    407ae4d1f7153309ebd2557b8a904e37ef1dac9ae3f11f99982467754efb68d96306c3a00d37d43a717bd9ae70c8045397ad7740a57014d369c656e8b68d1f96

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9cGsGJK16lj3Ai1xQ6lj3Ai1xB:CTW7JJ7TyGsGJK16lbE6lbl

Malware Config

Signatures

  • Renames multiple (3319) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\23db8503f4c62884e3718d1a162efef0N.exe
    "C:\Users\Admin\AppData\Local\Temp\23db8503f4c62884e3718d1a162efef0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    51cce1616edbe4f19e2efa6183082c3c

    SHA1

    428f97038f87a1ad7c0272795fb1b1875c9c43f0

    SHA256

    317f0406e30cb9efeb2f31c0e2ce2bff04bbb4b25c93d04ffde65611ba69664b

    SHA512

    0f4fa8cdbdf732e2189f5e7abb4b2ce95b6f3cc0e046b2e27d17f1695758254aa3b56f37b4345ee47af8c6a60d9b09396de462ee7ee749a84b4aeee1503953c3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    3132e246ee952747ec781886fa12ea5f

    SHA1

    a06b2ee4814fb4714f213d322fba30508721648f

    SHA256

    41640f259f80d3905aab60834bbb2c74fef73ce5a19cea2a39a0fbda0042bcce

    SHA512

    49b18ae10b9cfdd27e3405a1551f7f72c29307cb4698f1cd27da539b23dcdbc567332a49ccda248092dbb170ee1aa765d9cf6765b804a7a70c5ea7c4528ca527

  • memory/3052-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3052-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB