Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:16

General

  • Target

    06288c3020041242d2820517b99d25e94ce56cd76467719ffb27dfc97a8ecaadN.exe

  • Size

    32KB

  • MD5

    6bac3535f1004db638941af594a2af50

  • SHA1

    f3782f2e1a8d39fd85cba1ee8922194f08e581ba

  • SHA256

    06288c3020041242d2820517b99d25e94ce56cd76467719ffb27dfc97a8ecaad

  • SHA512

    51cb44ba66dbc5b9c65b95ed5411738028c19befa2034d6f4a2d09590a8a3a76dfaedceb9550794e3785459592a372a172bb6f73b8bbb76edefbb879db2429ec

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9dUZJZv:CTW7JJ7Tynv

Malware Config

Signatures

  • Renames multiple (4115) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\06288c3020041242d2820517b99d25e94ce56cd76467719ffb27dfc97a8ecaadN.exe
    "C:\Users\Admin\AppData\Local\Temp\06288c3020041242d2820517b99d25e94ce56cd76467719ffb27dfc97a8ecaadN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    32KB

    MD5

    4a99886d7ccc59806da3b0d931233e02

    SHA1

    63ca0c65246d5b4318c7bbf69f9fbde94b568a20

    SHA256

    f6504320d358f6dd6c4c0601be8a698875b5dac3eec36a2de9c9082b4f665afa

    SHA512

    502362a0e6163393309d2ae5409ac1cb344ad1fa9c57c11b7e1f6455a82e14ea0e4246d84ef66885c8d59a590d6dae2848c3a8a932b2ca48e06005b498808dc7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    41KB

    MD5

    150d996135e83e3916d826f69b2214fa

    SHA1

    ed5f446890bd9d3e0d43d5d469968c0838b0f802

    SHA256

    e6885277aaebb30769b96abcb4e4c80470bdccaa4b3a1973a24a4d58b85652b9

    SHA512

    e4b6a26882787921fe4054715742d277c838d68f772aad665ea25f3b0ad3050fdab4e2f328f62e428e2962cedd8d700d165962004807e043bdc96b7827abe88e

  • memory/1152-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1152-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB