Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:31

General

  • Target

    26badd1483d373332912e5b89b59b0ba3b46c209298f2913dc114851466034aeN.exe

  • Size

    93KB

  • MD5

    12e281fb20d9153c72de7bae71cf5410

  • SHA1

    3b429b417a5c890464b02fddcf033a14d360bd34

  • SHA256

    26badd1483d373332912e5b89b59b0ba3b46c209298f2913dc114851466034ae

  • SHA512

    ec6b25874210ff5fd2cc8db6024d09f070ea71438bd9358f5f17dac0f85b091a735cb354a8ac246a98fd285cae982d39d4642cabba694a6f9fc7353d09405d0b

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5F2t:fnyiQSox5F2t

Malware Config

Signatures

  • Renames multiple (2958) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\26badd1483d373332912e5b89b59b0ba3b46c209298f2913dc114851466034aeN.exe
    "C:\Users\Admin\AppData\Local\Temp\26badd1483d373332912e5b89b59b0ba3b46c209298f2913dc114851466034aeN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    93KB

    MD5

    f7eb6c3925430a0b5565f91fe15d1f0e

    SHA1

    d15cd51d9b29ef71415aea189b809cba5b7fa568

    SHA256

    d7930c089c72f0bbe97aa28eada10a38631625872108f4098b67549c0ef4b76e

    SHA512

    bdb06bfffeb40a9bc819dd4062183d173c79b52fb4793db4be79874de9072f7fd28ffff768ab1c5522d6520efdd0736b1def05a8b1d174567d66451480a1bffb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    102KB

    MD5

    d49d7cfaeb3e100e4129c093a8848efe

    SHA1

    0c354e892aa7df6187183bc696d18045ccdf257c

    SHA256

    fc14532d376e3892fb965513faf4beb786cb261c790d3a384c1ca1596d703148

    SHA512

    3184bad4ded2a2e54f7dce175fde5e10db8986544af93869deb0c5f93ab797dedbd360d79995d1bf40adb5a7ad49b8432f1c33b19c9781c1456b37ea706cb52e

  • memory/3044-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3044-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB