Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:21

General

  • Target

    142f66762c03aa015c2220afde1f4c85fd50def276f900b28630a0a3cd307a73N.exe

  • Size

    47KB

  • MD5

    9d644d202ba55bcba23720bf0e613b00

  • SHA1

    ea836919a81d673c15c8d55137e840c176b79e6c

  • SHA256

    142f66762c03aa015c2220afde1f4c85fd50def276f900b28630a0a3cd307a73

  • SHA512

    f33d44e35af6cdf833eeebedfdb6f8e431a511dd1f32dfc013642977a504a4aedfb74173e8268c47caaae82ce9b8b9ed089909b5a990bee613348c8022cbf2e3

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcuvoE2OiJfoE2OiJo:CTWkySSh9j+9jpGnrBCBMxixa

Malware Config

Signatures

  • Renames multiple (338) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\142f66762c03aa015c2220afde1f4c85fd50def276f900b28630a0a3cd307a73N.exe
    "C:\Users\Admin\AppData\Local\Temp\142f66762c03aa015c2220afde1f4c85fd50def276f900b28630a0a3cd307a73N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    29bddca6b5a8ca84de2ed26e906ec2e7

    SHA1

    7c4b130664b6e5e3c607d7884acdc27d1d17e974

    SHA256

    94f53499b6918d8bfacd05b054dfd4701e352fb75e0de24eec3c720209e95c05

    SHA512

    2d3299a8f504e6a6991e1a623c42125228f1ea5c7d98ceea01703825d9b803f3b11c8b2b8a8146efb46175913e2e363721a53e053bdb9a2b76d72d7c3c671038

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    25ab36a1fdd243a1babc1e9913670c8d

    SHA1

    f3be4a98f12cec8b9e792c352dd7e0a17354d491

    SHA256

    e5f3854602f49df4bdb8cab8cc55a1ec213162a9d01d3c31d90b9d4fae8db28e

    SHA512

    2d5f0290ddba7d976451db36a513dc7a89af3eec36321c48e2d5258d22a9a02aea86e5200843b01009728fadaad2c1a37f40ae591eab698f0ec2d1ac13601c4e

  • memory/2724-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2724-27-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB