Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2024, 19:08

General

  • Target

    217fe9c2375a771c937ba86b64250656f6d4f7ce29678134b4302564d5b87feeN.exe

  • Size

    72KB

  • MD5

    1abf1cc59ce2e7319ccf8c2988275d60

  • SHA1

    f6fda5641f252ed1660502b9a53d9a801abb8649

  • SHA256

    217fe9c2375a771c937ba86b64250656f6d4f7ce29678134b4302564d5b87fee

  • SHA512

    af1db3594f0d6e2757336dfb4495a69c3e2d272afab2665bf896df2053cb2d56b48ec019d70656bbe7cfc6489b1fdb73bbb2ad6c283a152b86ade69003318578

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2r5:V7Zf/FAxTWtnMdyGdy4AnAJYq8Yqb

Malware Config

Signatures

  • Renames multiple (3096) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\217fe9c2375a771c937ba86b64250656f6d4f7ce29678134b4302564d5b87feeN.exe
    "C:\Users\Admin\AppData\Local\Temp\217fe9c2375a771c937ba86b64250656f6d4f7ce29678134b4302564d5b87feeN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1172

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

          Filesize

          72KB

          MD5

          ae333be3ad3d6719569a74c7181f0d6f

          SHA1

          1d38df5bb4da869d2f706f12a0af659a5e8d942d

          SHA256

          168e8c0b429ed779201a7410b265aa9b8112ab431a99102ebceb19856c8d8b83

          SHA512

          e5e9b7c45b80c08316f4fdfb01d32ee18e6433d6b4f0449ab26bf5a793ec9a995a1ace6cc68d0e5f1f1d1e75aba45879e22c557e11825822227cd19ca4e65350

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          81KB

          MD5

          8fe093cfec0934051d4c41aa519fd550

          SHA1

          3c9ca482be08b8df0f153e772c13c49abf0be200

          SHA256

          bd4391d70489f3cb869dea118db2bb644826e24db83fb844565f0b7ffabbfb8b

          SHA512

          47e81c6ac9067cf77b5d99587f8020d5acd8f4cae5d3de7a992e6e7b7ec3344f00327f90dab8022fc235d3808be350450d8ea60b154892106cc26fc9681535e2

        • memory/1172-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1172-74-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB