Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:11

General

  • Target

    dd78f17aa868fa27bf1e1c2de05a2d11c044bc13e1aa3d5d846f9d11cacbd165N.exe

  • Size

    37KB

  • MD5

    94e407562001412f9e8057dafbafe4e0

  • SHA1

    c469dbba49e623f5f15d7faf3d1059e8a2904c3a

  • SHA256

    dd78f17aa868fa27bf1e1c2de05a2d11c044bc13e1aa3d5d846f9d11cacbd165

  • SHA512

    9828cde408c873dcf682cbfde79267f48b39e30c7c1ede4073dc307c298a886452d575b2c3b21f38f6fd319d138bd902e8c99a451966ba079b0e814369e64611

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKe7Leop:CTWKWZ

Malware Config

Signatures

  • Renames multiple (3197) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd78f17aa868fa27bf1e1c2de05a2d11c044bc13e1aa3d5d846f9d11cacbd165N.exe
    "C:\Users\Admin\AppData\Local\Temp\dd78f17aa868fa27bf1e1c2de05a2d11c044bc13e1aa3d5d846f9d11cacbd165N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    8a62f6eaab4af7e29612439705244d10

    SHA1

    f4259ae8f33d26c4871124a014e2321d45718bd3

    SHA256

    6e0d2feb077b7b647847efc432cd92420126aac0e54a7cd9c95ab40b5b7a24b7

    SHA512

    c7a2b8c998afcd2a36ca658ad23fc40e173ecf003c3ed586ef4702dc49f4cff5baf8403d17ef2b71ed213b4c8a25b8de46af325af09068b70ed3b918e830a905

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    46KB

    MD5

    276b362d97f16219cef6888072563177

    SHA1

    b4c7382af8c264bcf35aa85e7bc4eb47128b57e1

    SHA256

    9425980e56153671d7f616a5aeae84794f943a3f9894519b2fd7c87868e54180

    SHA512

    5624ae3c88f417daf21e1a627182d238d6a27bf1af969129a89683fae98372bab6b9cd685fef1a82301fbc898fb59b69f50e751908c7f8c6d68a1eb3607c8435

  • memory/2692-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2692-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB