Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:44

General

  • Target

    ec0333198729bbf2013be478393a0163bdbfd19c53a627a2e9a0c35ff261a5f4N.exe

  • Size

    45KB

  • MD5

    31631269613dfc1c4694274391bba350

  • SHA1

    28c28a453eaf382367e9b833292fa7a8c3b0a575

  • SHA256

    ec0333198729bbf2013be478393a0163bdbfd19c53a627a2e9a0c35ff261a5f4

  • SHA512

    9d2027545ed365bff085093abcea7235103179e8235f08398e00545b8bff00e72505348081118bb51bf4093d7042536e970a585f0b5add5f55297bec2c98723b

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcuvoE2OiJfoE2OiJ9:CTWkySSh9j+9jpGniJ6XJ6x

Malware Config

Signatures

  • Renames multiple (3138) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec0333198729bbf2013be478393a0163bdbfd19c53a627a2e9a0c35ff261a5f4N.exe
    "C:\Users\Admin\AppData\Local\Temp\ec0333198729bbf2013be478393a0163bdbfd19c53a627a2e9a0c35ff261a5f4N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    96907fbef82d7dbca9e1bca5f6e0d221

    SHA1

    de0a2565abf2804977175285e9775268ba16e85c

    SHA256

    eadcb9ab05d4bc245ba3783c1b4828f95a4508d178d72b62affedeb6230279bd

    SHA512

    2e855696a40d40563de332f2738a41d4cb5799d66b30921b57659d75a67e4c98756019059537c43f9ea80b9f46687adb9090182b5b261a3ded97b9a27896b8f0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    84dfb12a8dd46715c00e9be06e8d5e52

    SHA1

    cfdd804efcf9af3c3bf50e80a421827d4fe7e58a

    SHA256

    a58f39dc024de5b08c928a3f7a5eab06244782502047af378496f5243d6ca23a

    SHA512

    bd284f6d7379c53ab4769e11a5f713f962c5ca8ab5d944af7e8acf7b1086581aa0d4057660d409a0e5936e9214be20544073d9a4f874fe989331743e5daa7cea

  • memory/2516-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2516-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB