Analysis

  • max time kernel
    120s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:59

General

  • Target

    ae6405cbba8210206821980ba9199609dbb149dbaf78266a99eb02d95c87cce9N.exe

  • Size

    39KB

  • MD5

    e4b8c5d772cf72bb145465ac7543a650

  • SHA1

    2ac4e669c6f891cac42e02b1cfe9aa8ce68d190e

  • SHA256

    ae6405cbba8210206821980ba9199609dbb149dbaf78266a99eb02d95c87cce9

  • SHA512

    1a5629b9db27905ee338677d6c3211bb286f86279645c6b1882e78827eaee667318b3cc515ac9a12eb858bf3fad8baf265409afb802f553faa291612559261d8

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tijLeoVERZLeoVERh:CTW7JJ7TTQoQ4Wh

Malware Config

Signatures

  • Renames multiple (3262) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae6405cbba8210206821980ba9199609dbb149dbaf78266a99eb02d95c87cce9N.exe
    "C:\Users\Admin\AppData\Local\Temp\ae6405cbba8210206821980ba9199609dbb149dbaf78266a99eb02d95c87cce9N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    a457285747a7cc78fc17673ab7d6539f

    SHA1

    2baf09129e1db6fea1f98d61a1276747d7d9a16e

    SHA256

    9bd792f8d83b5278d243cf41ff32a2e325ced6b15950640c32efbe8aaddbfbbb

    SHA512

    8054fb67ca12551a1e90b11192e1af3b9b6275ba66405c5341026bdc532f7579693e23be1406f6a26418fa9816c69f2a930a2a097c2fe942cca8e2807542284b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    7dd77a2413a9865b6f290d36b6e91fb7

    SHA1

    0129f1146417e88b287c941ca3a4ca119769a305

    SHA256

    8a6176f8366c113c9412e6c88961e91cf64c4a06689a18ebff1ccb42c33bfb5b

    SHA512

    565e655ac4068821f4512b3a90f7be5ca0f7d31f69ba61de1ecbd366f335dcfd211fedcbf1aa3adc2ad85b4fdd4a9de1cbb1ac9e2bfbea7295dac8e364c4cfcf

  • memory/2104-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2104-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB