Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:38

General

  • Target

    70245462a432f2a71b48c5fa85dacab869b51e48f29d6bc9cf50b6715854d4abN.exe

  • Size

    75KB

  • MD5

    cc64a708880b5d0e95181c40e7e11eb0

  • SHA1

    a236ea858cfeff41c70800098fe6336a89612b5f

  • SHA256

    70245462a432f2a71b48c5fa85dacab869b51e48f29d6bc9cf50b6715854d4ab

  • SHA512

    a1c0abe9c5fefe97915ebb0c264cd2d2adfc823dd2bd93cf871c9531cf182e214a40b794458a199b586df06d59fa03d0dbe336dbe0c4957c4885e9f3a5a125b4

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2r3:V7Zf/FAxTWtnMdyGdy4AnAJYq8YqZ

Malware Config

Signatures

  • Renames multiple (3264) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\70245462a432f2a71b48c5fa85dacab869b51e48f29d6bc9cf50b6715854d4abN.exe
    "C:\Users\Admin\AppData\Local\Temp\70245462a432f2a71b48c5fa85dacab869b51e48f29d6bc9cf50b6715854d4abN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    5b4f7501ca8a9673911b3e3dd21f711e

    SHA1

    133c420a1134207d94175a77d288156da2928a76

    SHA256

    a31fb42f40626b393d80d99b6dc0b5cc965e55d2805723697d0e4578d4b3dab8

    SHA512

    988cc54073da04057fddf10e48031969db3aea20520806fb21e97f1aa8d521f4b0027cf7a8453c122260f170ddeccf1a478ff645f199b7c64e11639972be3799

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    84KB

    MD5

    5b5299d0d106ffaa50676706639ec9a9

    SHA1

    c38a9853058fe78510fc45832df5797fdd23d72f

    SHA256

    eb210afb5e7531389e093d04b930e38e866c29dbb01e094f0b94a5928cb84951

    SHA512

    3de647901439a14d8302daed50c9a0cf3d04848f6071a716a50b129e15084fb9a12671e9aff3bd419e0aab403283324c18cdf2490696fc8d169ff654e6ef9e5f

  • memory/2512-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2512-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB