Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2024, 20:08

General

  • Target

    065acf22b4d24844fc7dbcfb596ea0edfddc0a2a55a08aff4e6f19e608bb6956N.exe

  • Size

    75KB

  • MD5

    022cd581ebdb84fe66cf8904335ce500

  • SHA1

    8e839d0bf801ef4832d9fb33ab5b522a5d708df3

  • SHA256

    065acf22b4d24844fc7dbcfb596ea0edfddc0a2a55a08aff4e6f19e608bb6956

  • SHA512

    042ba73b86e1274dc97d858c9312bd56be891b0aa58425032698f23da9f71ea9584e033dd1f3ba3d887b6000c4026f3d24facc040115b458ca082baf08c755a4

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rw:V7Zf/FAxTW/ySSh9j+9jpGnu4PN54PNM

Malware Config

Signatures

  • Renames multiple (3073) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\065acf22b4d24844fc7dbcfb596ea0edfddc0a2a55a08aff4e6f19e608bb6956N.exe
    "C:\Users\Admin\AppData\Local\Temp\065acf22b4d24844fc7dbcfb596ea0edfddc0a2a55a08aff4e6f19e608bb6956N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    2ee4aef749ef4e3db8a3f01905036ecf

    SHA1

    8edc38d47a924fbf34e2549a9313e58e99f76908

    SHA256

    98693cd0d50981e0c13d5c1af71925973267d0ea30ff82657bae4c5899c35bba

    SHA512

    2a0a0dfbf270baa5b33121041b30265220e2c481402a86842359f8759b90c281a3fa3dd515e15dfff1a41dacb598a19fd35b8f0271c12a38127fa5995174c626

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    84KB

    MD5

    4b265c2fd5026dae18fa5023dfa435c4

    SHA1

    6518027fc23f904007df41507cab682fd637e1fa

    SHA256

    f41acb90694d7c44813fbf922ee13fc29239771c8340fd4ea0170b0acb2d2504

    SHA512

    083343e92a59893312ae7038047326687b8c4298f9900991bc90fd765f630da8b2a9633924c247fc39e3ec77f3054c4aff9422b08d185ecf8d23dbf5548c3d09

  • memory/2320-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2320-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB