Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:09

General

  • Target

    180ec28a3a2e21d50fd730247bbd019a36e543f9f54e2c17b8925fcdb1b333b3N.exe

  • Size

    107KB

  • MD5

    517889e5ec8c2c08e6ee5b851a1825a0

  • SHA1

    393d888d6325f48a5169029585189efd3f0c0c78

  • SHA256

    180ec28a3a2e21d50fd730247bbd019a36e543f9f54e2c17b8925fcdb1b333b3

  • SHA512

    97666799cfc1ac4d6253bca936eec01590b3fc49eca8588538735a3bd928ab85107170e16ae3bdf86febeb6ecfbf61d02dc08d770ab2f4af42cfb7cf66bc8d27

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyoKIKIKNKnF3KNKnFfTW7JJZENTNyoKIKjeNep:fny1tE5KIKIKNKnF3KNKnFotE5KIKF

Malware Config

Signatures

  • Renames multiple (2946) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\180ec28a3a2e21d50fd730247bbd019a36e543f9f54e2c17b8925fcdb1b333b3N.exe
    "C:\Users\Admin\AppData\Local\Temp\180ec28a3a2e21d50fd730247bbd019a36e543f9f54e2c17b8925fcdb1b333b3N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    107KB

    MD5

    8f25264845f6ebaf44e359834dc55ae0

    SHA1

    f64621793e78c1165fefd8262be3432286da802a

    SHA256

    7e16199427e0413ed887300b85e16f4e7e8db4907ea51437595d3713e300fa6a

    SHA512

    874daa7293452259684e1947290c97f06c6c159bebed3cb37be8d91d3438e6aafcfef5775689cc08558a49cc90f33d61f5e1269f16036716b8664093c05b463e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    116KB

    MD5

    c648dbf7c721becebad5f27110238681

    SHA1

    9ad465445c227fa7cc84499cc715c0c16806e8e4

    SHA256

    b3fd291d71a33560a86401fbc13a2392fc1435e0aed94112040f7f54334388d1

    SHA512

    01a98c1762d2e7dec9d0d66954e31168584b6f203712b979b6cbce861890fd91288e4b15ab3e5fb58a0c365cac593d861967f596cb74bcce11e53edf0afe191f

  • memory/2112-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2112-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB