Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 08:54

General

  • Target

    16df87b15565ba524cc28886a10a8af02dec5aad626874d9779e4000399d42beN.exe

  • Size

    101KB

  • MD5

    4902ae2031d7fb54f5fa7882757c2f70

  • SHA1

    b5f86d9fba455342a4ed92e5881d4d33c39d1909

  • SHA256

    16df87b15565ba524cc28886a10a8af02dec5aad626874d9779e4000399d42be

  • SHA512

    2c6232fcf4cf04b92ff40746c075fbe13e61b3bc85de300fec32acf02d6c30532d02e89e0137024b62ddbb167b8b06f87ca6b142221465c337230bf630379f06

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rE:V7Zf/FAxTWtnMdyGdy+TWUnMdyGdyWV4

Malware Config

Signatures

  • Renames multiple (3067) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\16df87b15565ba524cc28886a10a8af02dec5aad626874d9779e4000399d42beN.exe
    "C:\Users\Admin\AppData\Local\Temp\16df87b15565ba524cc28886a10a8af02dec5aad626874d9779e4000399d42beN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    e4a52c2db4e63afea32c28bf11657c62

    SHA1

    cca5b7ed5c37face2fb9946dd77a19b620eec9a0

    SHA256

    58199b2e0b46cc2f843212fcb5f2e6ea09a5249d2159eede5dc13ea9926ec639

    SHA512

    072aca3b5c2d7ed3b8ea333a91de5c393affc9036925f23866ce59cf303118a4220cf9a8e4b7246ec2f052dc6ec51bda8c598e37d1ee94f4b8b69bfc38b241ce

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    111KB

    MD5

    ae07f8e83507a7b4433a7aef88b8afac

    SHA1

    3ae78fcba22a20d8bc950915bb450b655c17d8c5

    SHA256

    69cd2ec0021c734e4a56673184503982091177905cc782cd3ee271c381da66a6

    SHA512

    eaf64ef5a357a76694b63da5cc070e05a8586d0f12cb3583a499de6fcee9d8957408a1b39a057522cbcf13b31c0738d398eb246928f75f6ddfe49aaf8d13b37e

  • memory/3012-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3012-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB