Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2024, 09:08

General

  • Target

    5d8ff79bb4b4635f6d86a4f915fa691d28a54d7188cd0a928da96c4bd152bc46N.exe

  • Size

    74KB

  • MD5

    da3b7f3f439f36578360935307fce1f0

  • SHA1

    779d4807088ae72fc6330da816d2d1c40b809959

  • SHA256

    5d8ff79bb4b4635f6d86a4f915fa691d28a54d7188cd0a928da96c4bd152bc46

  • SHA512

    987162b59ef3f080543fdf4438a2598f5611d65d96e0c78c4f89e7e895daaf2d5aa1b13c27d43fb885401460b341914e1db26f77246baafd5aad7b1b2ee65bae

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mdF:V7Zf/FAxTWoJJZENTNyl2Sm0mgI

Malware Config

Signatures

  • Renames multiple (3171) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d8ff79bb4b4635f6d86a4f915fa691d28a54d7188cd0a928da96c4bd152bc46N.exe
    "C:\Users\Admin\AppData\Local\Temp\5d8ff79bb4b4635f6d86a4f915fa691d28a54d7188cd0a928da96c4bd152bc46N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    1ae3241c288da842cb60380d561301d8

    SHA1

    c14a045e50767fd0f1cb04475415ad086e0c7bae

    SHA256

    1b9213d91a959456b58347398333a3da41aba2724e69d518d7f29e8469263860

    SHA512

    0391927b167248d47f30bc6b54ba20f00927678cc76e669153eda68a62a3edbc8765f9a638a917016bf7f1f01948504964290e0d108c24d6dd143f76b44cf217

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    84KB

    MD5

    75a3af64329239242511d3d0644bb86b

    SHA1

    bb519d5c96301f12e74fbfb7d461dea68a0e1c8c

    SHA256

    4d70642e65f2ffc2fb19f6a0f9ced8b952c6d82448454244412995cb9049d81d

    SHA512

    25f0d68b122557aa159b37ab70da9fc2d89144b899daf086bfc23c3a91f0b0d12f44ef3162024a57f13a1647b2fdc744eced3553920e4d570df9781b54295658

  • memory/2860-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2860-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB