Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:42

General

  • Target

    4e50b77d29c2599e210879ba49eb34ff9528d8630e5b9954b4f46f97c7fb0648N.exe

  • Size

    49KB

  • MD5

    759939055cbb45e422cdc30fff666980

  • SHA1

    524dde338058db9a6f0079e2b81a0d71b56e88a8

  • SHA256

    4e50b77d29c2599e210879ba49eb34ff9528d8630e5b9954b4f46f97c7fb0648

  • SHA512

    e334f9b28838146379a37cdd4f1c8966615f8256a531ab8409b626cbb14bdb6052639b1aed2f9943e43b240ac34b0ab868c162e06d57d16f204c0f96e3f72cf5

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMds:CTWUnMdyGdy4AnAJYq8YqiXQ

Malware Config

Signatures

  • Renames multiple (3394) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e50b77d29c2599e210879ba49eb34ff9528d8630e5b9954b4f46f97c7fb0648N.exe
    "C:\Users\Admin\AppData\Local\Temp\4e50b77d29c2599e210879ba49eb34ff9528d8630e5b9954b4f46f97c7fb0648N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    14a8bc94d1eb287de643275db2e676c1

    SHA1

    0d740482856d93b64fde5dc11e5604a63dc43ada

    SHA256

    b6991584af21ef5743e09844d30815ee5afc1c76a5de0fb5e6e7ab4326fcad76

    SHA512

    6c7f1ec4d66c8afba0c29cc9a1a3daad4ec7b55bb3591201a2027c48063a4ef8716d9500634180730c0b0fcd4f37c0c8a592e7e897a3c971b01814b89dc71dcf

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    3cc3d26cf41ca52b7b848b3f6c94a769

    SHA1

    f7acc022c9751337a05c3521d7743185c76c1ada

    SHA256

    430c12d1772e3c35105f9fcf70ade20d12c16a0d89df26ba7047eb3dd7c2f383

    SHA512

    ecef521b2a19b65faac371f285f8b8dae9254bec55458b0decd8bd6b2d9f75afb4c1e629db8bb7b28d8efe5ea14a16dee8dae21cfba8f4851e2d842469a6c27d

  • memory/2936-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2936-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB