Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 09:26

General

  • Target

    31f394aba7f3b7a210ef6fcfe6dc4a5a8215b63e602f402d220a3768a8d2a3e8N.exe

  • Size

    50KB

  • MD5

    bc1168de1f1f89befcc608f29a6b1c20

  • SHA1

    9b940a1ea4f4423a77f4094fc27eb7bcaab4fb26

  • SHA256

    31f394aba7f3b7a210ef6fcfe6dc4a5a8215b63e602f402d220a3768a8d2a3e8

  • SHA512

    df91bb05cc31ae39f1194137b8ac196ddbd18be2bdaa955f5435f20cab55dd3fc9f133571bfc830d161973f817964eb491ad1568f7790041cde8c91fb72aea98

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9ARFRX:V7Zf/FAxTWoJJ7TC

Malware Config

Signatures

  • Renames multiple (340) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\31f394aba7f3b7a210ef6fcfe6dc4a5a8215b63e602f402d220a3768a8d2a3e8N.exe
    "C:\Users\Admin\AppData\Local\Temp\31f394aba7f3b7a210ef6fcfe6dc4a5a8215b63e602f402d220a3768a8d2a3e8N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    bba5e99a079aa34e2327a8c099bda0b2

    SHA1

    e4a8cfff74f9f263c7f2cef129beadb4bcd54b48

    SHA256

    1f2106e999ee93843fd6f9726e380731ac452a7655f37cbee8e11226aea429fa

    SHA512

    35427ba806efa54f38562c93ca32abe01ca5565a5edf0a20c300677c2451125a5dba4aee3d411c56862ada215780cb414d9046f4e770c7425d6ff8027dfc01d6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    59KB

    MD5

    0d7b5747f52a3bd8a3dac075adf93098

    SHA1

    d24c47b2ed3fbcc2cda68df2c7f89fbb402036d4

    SHA256

    4c9024997cad9b3b8a6eb799c5da84c837da869481a925536855bfac1c5cbe7b

    SHA512

    71ab06bc92815c84296254134b0e818011be4f20aed7851637b45d6ebca0661acb09ce2578485a62b1ba3994a7ffff0312b7dce765060c03bd3f82f99735e6d8

  • memory/3020-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3020-26-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB