Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 09:11

General

  • Target

    d508c4d98099aeacef301eccd4f51d65f5cbbef63ad9ed4773ec3e0825168eb3N.exe

  • Size

    57KB

  • MD5

    d009b76851106ef884e8edbda8dc2780

  • SHA1

    c09384b00d200846d72d40cd2885be8a68b9f073

  • SHA256

    d508c4d98099aeacef301eccd4f51d65f5cbbef63ad9ed4773ec3e0825168eb3

  • SHA512

    593ee90e0791eb68d48cf25e44cbd5302ce20ae8356002653b49e208ed1bbe8d0f0623a6d77a36b0d55d877d91264561c90803f1e68f2980d1554f32a86b7803

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9MEX:V7Zf/FAxTWoJJ7TyEX

Malware Config

Signatures

  • Renames multiple (405) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d508c4d98099aeacef301eccd4f51d65f5cbbef63ad9ed4773ec3e0825168eb3N.exe
    "C:\Users\Admin\AppData\Local\Temp\d508c4d98099aeacef301eccd4f51d65f5cbbef63ad9ed4773ec3e0825168eb3N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    1086066ca2726c9eb8372233a630bdba

    SHA1

    18b69c81e296d6574ec6c655ecd470c1e2f1d097

    SHA256

    831102b793a827398ea712395e0b985d0bdb07c21a96577473f9a5136e18ff51

    SHA512

    df09a45eee934afc80ba9ca614c38e3975e8c3fa20e7c28dd8ad9212312e6b92ca0dbb5927800767a895958a336875533e5018cff0e7f42fbd0b1cc5cdcd680a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    504135322d756aaa52e8afda6a784233

    SHA1

    0dcb0ea6e1f7db66a5b691f5f066d3727f85c78f

    SHA256

    d466ce03d8f7139f85360c6d63f936a592b1671cc6301206d1a1af98ecc375ff

    SHA512

    a08934d3e470f026fbf8292e8e5a8c25cea361a5c826eb9143bd9beed43748b5dff9f985989f6a8e118b7b8cf7590cff475cb04f07aa8958b6de512595ffa3dd

  • memory/2120-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2120-26-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB