Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:05

General

  • Target

    097cefc1a6263d78b81dbd8f6547d1df527919e5b66bb1aa6bbe29de4c3c44f1N.exe

  • Size

    28KB

  • MD5

    6a76ecdb4a98579474490004a2a67580

  • SHA1

    5a36c97f24b177a96e4df0e1c8eb63e7c9a8f4a8

  • SHA256

    097cefc1a6263d78b81dbd8f6547d1df527919e5b66bb1aa6bbe29de4c3c44f1

  • SHA512

    dbb7a4a702148ab9174815fd74fc3bbf60bb7d722d388a86eb152582145b9419839fc36325dce0fb5c056f794a8eda789e9723af64bc2d42a1d158cdd80b2a3f

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9UwNrH:CTW7JJ7TiwNrH

Malware Config

Signatures

  • Renames multiple (4182) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\097cefc1a6263d78b81dbd8f6547d1df527919e5b66bb1aa6bbe29de4c3c44f1N.exe
    "C:\Users\Admin\AppData\Local\Temp\097cefc1a6263d78b81dbd8f6547d1df527919e5b66bb1aa6bbe29de4c3c44f1N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    28KB

    MD5

    ab5df1ccdc26b132a4a18a7b2f11ac14

    SHA1

    748d00a8a1b7532ff905d22b37b762d781f4e946

    SHA256

    b71b0850dda14294ba462994d820b620698eaf12cd9764b1da19874bc8d8ea7e

    SHA512

    4021c5dc6c3d1490ab47810a233048ebd3e5b646c5d5437c9a60a367fa63700cd04291bc5082c6d1f1a35f71ab9d81413dc92abfe6685ba87de53b9a83fbf8df

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    37KB

    MD5

    941eb852e781ea5391e1c43bfc7a547a

    SHA1

    bf3cc30d4e225d7c25e150434c451bb752c93298

    SHA256

    b5f2bcc7563ae2781c4aff260c7c2f43ad89434cba00c360da726e13ff09b496

    SHA512

    2019ad0a336b9dde1bf5cda9c4ccf336822a595ccf765a06c9de952401eb006fca3f83e6624e69e9d40915545faa7fb8f253c4fa86b05b572e43f24e7fae4432

  • memory/2420-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2420-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB