Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 09:15

General

  • Target

    35f7968a6803c2af40d8cee1e44d08f46ab5ad08b71e6a0a0363da2f8455c48bN.exe

  • Size

    69KB

  • MD5

    f83abf8102e2fdd69aa0348d8e740e10

  • SHA1

    ed0c8c531af4204327a3c1dc6b055b01154bc9de

  • SHA256

    35f7968a6803c2af40d8cee1e44d08f46ab5ad08b71e6a0a0363da2f8455c48b

  • SHA512

    493fe7302fc224f79acd7168d5e1310bf914f13ea0689930939be4da6c047669b44cb8508211797fd8a1d6fea31379ecdbdf12953a9b0815d03c257151b183a6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9MBT37CPKKdJJ1EXBwzEQ:V7Zf/FAxTWoJJ7TUTW7JJ7TB

Malware Config

Signatures

  • Renames multiple (3235) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\35f7968a6803c2af40d8cee1e44d08f46ab5ad08b71e6a0a0363da2f8455c48bN.exe
    "C:\Users\Admin\AppData\Local\Temp\35f7968a6803c2af40d8cee1e44d08f46ab5ad08b71e6a0a0363da2f8455c48bN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    90c0177b07745193c9a92c9e0898419b

    SHA1

    049cf72eb01efaa7b41242938a70fea4b8d99f8f

    SHA256

    a07d04df24bff853b6034acbaada0d71cffe555283fc4a4194336bb0662c0d75

    SHA512

    5b92c61fd1642dcb383b6ac1e9c8150e9ae771c61b0d2103a1b1c63d93f1d6fb673a87728fb1950d63c797d7da5afa6593b1506696f9f863a5f332986bdef657

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    79KB

    MD5

    211439913e3f2917fd4a7b4ca3b02422

    SHA1

    91f34447d8eed82c2270ed3ef76c3a2f1eaf2913

    SHA256

    f9d6b60461f121a094f08ab92700f6589147fcb8fd6a2efff33dfbbc78357fc8

    SHA512

    6b0e184702a4fede842e29b405956bb2511a9c474cde834ecba507c5d3ac42ed689e2baf28d56945981496894028083892dd30ca935b87c7fcf2a9c5154ae7b9

  • memory/2572-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2572-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB