Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:45

General

  • Target

    4db8db0acfc6b548853ddc5ef8989d35aa7445ca708a2843d5399388fb9b8d0eN.exe

  • Size

    28KB

  • MD5

    e7e318153e01568a8436eef44a352120

  • SHA1

    fbe4abf017db814f71a874f66f9332ba61d3c0c8

  • SHA256

    4db8db0acfc6b548853ddc5ef8989d35aa7445ca708a2843d5399388fb9b8d0e

  • SHA512

    2ce997f489c95c0c5ae02d9c71288ea5f80d2078b2f71b2aead7f473d281fefe015436582590cbd2f7493cc7cc81f8a36959bc78facf688f47b2ab51425cd178

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9UwNr8:CTW7JJ7TiwNr8

Malware Config

Signatures

  • Renames multiple (3462) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4db8db0acfc6b548853ddc5ef8989d35aa7445ca708a2843d5399388fb9b8d0eN.exe
    "C:\Users\Admin\AppData\Local\Temp\4db8db0acfc6b548853ddc5ef8989d35aa7445ca708a2843d5399388fb9b8d0eN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    28KB

    MD5

    75b2e4c41d83b1bea5a99a5202dcc509

    SHA1

    409d4d2dcf07f5b2edd2a27894d741cea3b1d0f3

    SHA256

    331349fc220683ba5a5ee5e86a0e3283088950a076916e63743babbff65eb4df

    SHA512

    bb5014d3c40fa4b1e7846a34d2bc5e5d9827e78c4f66e948e401ecfc1e34ffd68fb52ad18101b807fbf24282db0552cad4cc80cc6fe2f6b59653b7efe4949735

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    37KB

    MD5

    6edc803be5797ce79f3a12f7d4b57750

    SHA1

    0e14577de49e8bbe38b2db589bfb040670662d9d

    SHA256

    7d4951e3fbc884e75e401acf28da0167c86e1b64a2925b5caec62bcafdb07963

    SHA512

    b700b218e3eb5104d7ee9428551a41c9f3b0b221cb7a9f91f00c6f784ee83dcc6c778df561176e62f8060cebdbc3695c6f50d1c60ff191f09285feb86cbc30a1

  • memory/2168-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2168-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB