Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:23

General

  • Target

    4881c11a060b335438b63763aab49cab9b5008d6e3cfb3cb9ace1a51d0f711a6N.exe

  • Size

    61KB

  • MD5

    679f6b4c708c6c8c6180294b01f96110

  • SHA1

    aba0a70ef94110e1e65d153c38703947fa0b8074

  • SHA256

    4881c11a060b335438b63763aab49cab9b5008d6e3cfb3cb9ace1a51d0f711a6

  • SHA512

    4810bd8d58e3a64fc497b09d78e9350af9b7a2b32e5390ffd0cd5e112d70237aa01fdccc557d13a5fa335d3748ca4bee46840dd812fb935c662af564385975e5

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti0kAPJPoL:V7Zf/FAxTWoJJ7TTQoQ/

Malware Config

Signatures

  • Renames multiple (3253) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4881c11a060b335438b63763aab49cab9b5008d6e3cfb3cb9ace1a51d0f711a6N.exe
    "C:\Users\Admin\AppData\Local\Temp\4881c11a060b335438b63763aab49cab9b5008d6e3cfb3cb9ace1a51d0f711a6N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    62KB

    MD5

    62fcf885b7adcb0ae6892e8c6f775c1a

    SHA1

    e425d9c90e480503754d42fa9cfdb65bedc94698

    SHA256

    af173e052f4221a5cc0ab0261dac954c1b1d6cc6b91c083e19ce909731be4f7b

    SHA512

    c1d8030310e99946018cb49c8ce63ed2958607291b6335df6ab66dd8aad67fa8dea0763839ca3d38dffda7871e03ba59b04faa6ef5447d5367c38a504f236d72

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    71KB

    MD5

    e864da589ada0fc751030e76598a5566

    SHA1

    617a9c1d0bac7fd07a71495580e4034d641f7193

    SHA256

    929e12d3d4b7407ac4aa94b753a90d7d7704af97da69440aa1010dc0b1bd0e70

    SHA512

    50b5e28c8979453982c61b6cfa13c67d7036fe0e3991ca51bddd9e909010ce3b4ef5579edbb1c5c2d729be82f1dbf9c54ed221b2798619253bb2180ac21b340b

  • memory/2136-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2136-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB