Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 09:00

General

  • Target

    989d399d302b812baeaf5d9cedfd8452b248c6abac164f503bb50bbea559cb17N.exe

  • Size

    50KB

  • MD5

    2efd449f981991bdd001eeac0ae70cd0

  • SHA1

    fe8426297864ef13e685ae61a03442565f38c982

  • SHA256

    989d399d302b812baeaf5d9cedfd8452b248c6abac164f503bb50bbea559cb17

  • SHA512

    89c7f756349e974252d19f4b3079fb9ba8d4534329edcf447d7816c25d184e7fdd8038d09cab277cf849acf4c2c2fed3f95fbe19096385f85c325f774cee7c94

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9ebZoLSKS1:V7Zf/FAxTWoJJ7TYZoLRm

Malware Config

Signatures

  • Renames multiple (3418) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\989d399d302b812baeaf5d9cedfd8452b248c6abac164f503bb50bbea559cb17N.exe
    "C:\Users\Admin\AppData\Local\Temp\989d399d302b812baeaf5d9cedfd8452b248c6abac164f503bb50bbea559cb17N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    ae11109564c698dd09683a169254df3f

    SHA1

    537d9346afa02c378b25238282878c9d383dcbb5

    SHA256

    e876018d3277aa093bb4594c10b18a34bb586418af8ae9d06ec34137c57d81e0

    SHA512

    0fd4bb79cb57f3b8f60f6467dd9d9bae8b8cc9d7253e182df5cf0af5b372bbe47eba91b0b16736df68385f9633d98426d43b7899431273aa66994a1cb61c0308

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    3369598ed5c3d69d9cfb6c5782be7063

    SHA1

    53868ea99d39a3c7e1e385281eaeb16451cb9786

    SHA256

    2f273f16fbe85b252d427d7403ba73f8dac3e187e78eeda8b8a2b5ef4846da54

    SHA512

    9b4ff930c529c5e138ca20fd1ce662e9d1e6aab29008985e311d603913e721d5aabb6ff762ffb352d96f5cb462521620737c48a24e36f470898296760fe1294a

  • memory/2348-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2348-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB