Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 08:59

General

  • Target

    cee2a83374ff5a9a5202e744b86ba81a90322c43272d6200e6f5db0af06375a2N.exe

  • Size

    53KB

  • MD5

    564c091eddf241a46e143b130de70f60

  • SHA1

    ab05c766e2725be4923d8466ffc2505251578587

  • SHA256

    cee2a83374ff5a9a5202e744b86ba81a90322c43272d6200e6f5db0af06375a2

  • SHA512

    7396758d1312235e263284b57cb721e05c3a080883b6f8b8c3ccc42a961cb14cf54f5eecb13fe617e4a595e707e79290d87ffdb3dff3f828aa48dcff22b3fccc

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9Uwm:V7Zf/FAxTWoJJ7Tiwm

Malware Config

Signatures

  • Renames multiple (3249) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cee2a83374ff5a9a5202e744b86ba81a90322c43272d6200e6f5db0af06375a2N.exe
    "C:\Users\Admin\AppData\Local\Temp\cee2a83374ff5a9a5202e744b86ba81a90322c43272d6200e6f5db0af06375a2N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    2fcf00746eec280b03089b2f4089b948

    SHA1

    9f60b830c73dcffccee8af460457f1ab25f832ed

    SHA256

    3e2083fb54e7948bf281cd78ce792f42242d5f9197ca100904ab74f635b69d2b

    SHA512

    035d55ad9d43bb70cb226e8e10b348d31e519c85fce5a6e0d6e4022904717e9814d308d4d8ffb24890a7658c6128b0d08bc71634508978cc722c71efad0a2627

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    776b99b530b181fa300a90f55c2b0701

    SHA1

    ff328a40fe51408ca9fc54bc77fbab2983d6d7ec

    SHA256

    40803f58a8338ee5fbf51f18f20872692c6b7eccc952229d45ac2d253b439fab

    SHA512

    5f9a393b343c986cc683ac83a1b302bc8d9d99429d3e387dfd34bbfc16321ac4e2095d97cda6646a5d83e9949e883e904e78ccaade0e966094139da1a0063dc8

  • memory/1236-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1236-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB