Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 07:14

General

  • Target

    5f45e90c7b9397aaf8ce0e2bb8439c7f01d0e7d3c469508f181ba3a0fb53d0e9N.exe

  • Size

    65KB

  • MD5

    29531e364e8ccab5340875ed2c4a7360

  • SHA1

    76451b14583e058d4f69208e1619756a45bd9e37

  • SHA256

    5f45e90c7b9397aaf8ce0e2bb8439c7f01d0e7d3c469508f181ba3a0fb53d0e9

  • SHA512

    4fbaa2b7c49060eca00e2df3224f01ede9a6fd3771e4ee64b1da94f9b6129d18b47aa43a5fe266134f285feb2aeb0b1e94b13a2be8bb7801506657b182626163

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzz:CTWn1++PJHJXA/OsIZfzc3/Q8zxY5RWP

Malware Config

Signatures

  • Renames multiple (412) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f45e90c7b9397aaf8ce0e2bb8439c7f01d0e7d3c469508f181ba3a0fb53d0e9N.exe
    "C:\Users\Admin\AppData\Local\Temp\5f45e90c7b9397aaf8ce0e2bb8439c7f01d0e7d3c469508f181ba3a0fb53d0e9N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    65KB

    MD5

    b5e80f2001084c9043bbf3d254bebfa2

    SHA1

    a78388ad5ce934ee5c429cc8f68e3ab4bf1c470e

    SHA256

    c34e1ca320109f8dec266ad2e462f855ed59b6804c273942613e140e11bac536

    SHA512

    013958d8a6dc8ba27f4606ad28e6a9a557f195b42db3bf661468d841e51f5bba1cf2cf70925ae85e56388ce1a81587ff3d1ffe4ac017450ec31a3103b4bfb4c2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    74KB

    MD5

    764604a926914d5539f076011ba4e59a

    SHA1

    5aeba505b7ac7c36472f80483c0839b1535ddb78

    SHA256

    8157fead0c33358e4d16df4e1148e33daf74a9f5d427ac71b75f8aeb90644ffe

    SHA512

    ddc42ed8b14c583a101570903e68c1d02156c6daed38828b273de9815ea1c406f70d15c9cbda29a8fb614b7067a6921e845ae853a0a121f2259c8425829344c6

  • memory/1088-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1088-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB