Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:29

General

  • Target

    43633f6647a2bd9ea5d2174e91b49e5c3d1b6b4472ef6f57eee118403b24404eN.exe

  • Size

    24KB

  • MD5

    1fd6fae17c7f1329a1eb16e0ec094540

  • SHA1

    690aa735f033d227bef667e9c229bb96620874b8

  • SHA256

    43633f6647a2bd9ea5d2174e91b49e5c3d1b6b4472ef6f57eee118403b24404e

  • SHA512

    f7c7e0babbc7cbb8d65d23fc30b4b462cc687842b71f99fde9b4fc9761fed9bf8086faa2da2f1cb0a02ca06e97be28053005da92018b94b121df9d2c73574136

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9DC:kBT37CPKKdJJ1EXBwzEXBwdcMcI9G

Malware Config

Signatures

  • Renames multiple (3350) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\43633f6647a2bd9ea5d2174e91b49e5c3d1b6b4472ef6f57eee118403b24404eN.exe
    "C:\Users\Admin\AppData\Local\Temp\43633f6647a2bd9ea5d2174e91b49e5c3d1b6b4472ef6f57eee118403b24404eN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    24KB

    MD5

    d891fd7853449628518703b3b714cbf1

    SHA1

    54092fac402520e9ffeddf8ec5aa5cbe091546a6

    SHA256

    8d755d73845a8049eb1bce78e427c71c556cef3b4da1744537aafd523ce3ee8d

    SHA512

    f601f9f613839c4376abacc284a232e9660fb6638bf759bf544d9f6fc7e14e9e262e0b1908938323a90c148276820a7125a126e4d4311e18a5638814b7dc2613

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    33KB

    MD5

    c112d4a923658e08cff58b704dfeba7e

    SHA1

    88b9be552b4f8d7f297cd4ce02d9ab7ec2ab0835

    SHA256

    8a3f564368e87db2292704d2876ff047703b3bd358a77d4ee675c8c9473b91ff

    SHA512

    fcd86dbb08adaf9e3761a0ab99f7c1d63d587c4efc9b18638df845082c4d65b9b11d82c1b855ff0c2e2528ec15fb6797cb49091bf6803541a0669f4bde8a5bf1

  • memory/2596-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2596-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB