Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:04

General

  • Target

    07a301317b18347c15fae007799f85f173c19b4238787ac361c4056c521b0ec6N.exe

  • Size

    26KB

  • MD5

    3b8f64203c4e7c0c2ef16712fb37be70

  • SHA1

    54f6ab0756a22621dfbd14b3eab543a6a6a090a6

  • SHA256

    07a301317b18347c15fae007799f85f173c19b4238787ac361c4056c521b0ec6

  • SHA512

    0a4d92afd89ae5e45cc373f69e33f491eb71283fea42625c1b587d8095bf80e11f5c00308a5ca52e4f50f78988dc9d54e5a805c9f3fd315b8562e3ee1a0ed37b

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9gpw:kBT37CPKKdJJ1EXBwzEXBwdcMcI9gpw

Malware Config

Signatures

  • Renames multiple (3451) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\07a301317b18347c15fae007799f85f173c19b4238787ac361c4056c521b0ec6N.exe
    "C:\Users\Admin\AppData\Local\Temp\07a301317b18347c15fae007799f85f173c19b4238787ac361c4056c521b0ec6N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    26KB

    MD5

    52f8ad344a44c3c17c9a8b0852ec84fb

    SHA1

    9572e73ef7709de7a09d3cf921d747dda9dfa0d9

    SHA256

    4dcdc5881fbe152d3a1b9de1537d1649b27c07ac60d5723ec08161ffa88664f7

    SHA512

    9d3e64080f60d3f4f35eb47bcbf31f1bc63e439b479ef65af1612321ea143e634811516c0239bb3be37bcda0b829f2cea1ff8ffcdda829104ce5a96da1a22bd0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    35KB

    MD5

    495412cf19a379dc8d26977c5ffa9385

    SHA1

    884fd4405b90d2b21ded09b11204712a63abcd42

    SHA256

    38783b7e8841ee0948824075b90830d9a0da5ff0cf9bed8d8f5ab55ce682c8a0

    SHA512

    adab9e5d03178859f4c91195067ac79a14bf5cf7c91f2b6db27b891471be96f1d0d9110d7dccd978320d362f89ae4df4542a1b34e453b72c02929e9100a67b6e

  • memory/2524-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2524-73-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB