Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:35

General

  • Target

    122bf1e1bd6d0a595c937bf1e664dab810693203a6dd7ed451d065938644d659N.exe

  • Size

    32KB

  • MD5

    51111aaf3514c52e79c909a1e9043100

  • SHA1

    b0d46e9157b1c45b1f8e34c7d0d7fa10081faf4c

  • SHA256

    122bf1e1bd6d0a595c937bf1e664dab810693203a6dd7ed451d065938644d659

  • SHA512

    65ae414b9d035b2e9650e1dd8908c76c0372f6f9f29e3138885cb889bff049cf1d3d58ff23756d3bfa3752a8c999db3c374110007362774c8439a21d9b18a462

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeV:CTWb

Malware Config

Signatures

  • Renames multiple (3790) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\122bf1e1bd6d0a595c937bf1e664dab810693203a6dd7ed451d065938644d659N.exe
    "C:\Users\Admin\AppData\Local\Temp\122bf1e1bd6d0a595c937bf1e664dab810693203a6dd7ed451d065938644d659N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    edee28802616e0efa3a0a85dfd215434

    SHA1

    ec118ca9e43e3ce7f2ccf9e8975ff950c65e42ac

    SHA256

    20a7ce474f3ae0e638bda23fdde679a43e712963a9a365381c3c8b38a2fb4a9d

    SHA512

    6768c474068782b88b8994d146739018c4c5f2898afa695da3abd0aa418d54d722fd43ccbaf699673a032a569100c331112593c4d08805f92ddd45933281731e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    42KB

    MD5

    15c991d9838f2f4bdbf8d86634abfd7e

    SHA1

    52887a8af02bd581010a82962c6fea43b0a6fade

    SHA256

    6fdfe25103582a6587b9ddf0640fdeacedd274c3c278b4425d22adc4e968f75d

    SHA512

    b34fba2c1f87869f0de06b6eea705a023a968d0f23c59792dd3a890f588f42f6040f99eefe7832cfe909e745b20905aba2c4501d067581de843c328e571c5180

  • memory/2884-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2884-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB