Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:44

General

  • Target

    17eee4e5ea5532cff32f4f3c20c47d02bc0a090e991b8a0a433e0df97aacf1c6N.exe

  • Size

    72KB

  • MD5

    084fe60e4edf47114b9178cb26a9b5f0

  • SHA1

    9f82e2551ed00812e1b1f8b054e228c50d90b602

  • SHA256

    17eee4e5ea5532cff32f4f3c20c47d02bc0a090e991b8a0a433e0df97aacf1c6

  • SHA512

    f77b286e4eedba15f99d0acfbd75ec7a4a5b72b869f3acd4e89246dba1a45d08baabbd8cbfbca06d2cec41eec2f698dd10c6200b5054a3c399114758d9c95e41

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI982AZJE2AZJ/eBT37CPKB:V7Zf/FAxTWoJJ7T0TW7JJ7TC

Malware Config

Signatures

  • Renames multiple (3543) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\17eee4e5ea5532cff32f4f3c20c47d02bc0a090e991b8a0a433e0df97aacf1c6N.exe
    "C:\Users\Admin\AppData\Local\Temp\17eee4e5ea5532cff32f4f3c20c47d02bc0a090e991b8a0a433e0df97aacf1c6N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    6ff7c125fba28f941b02c31898c0d00c

    SHA1

    9655dc3e9b3a69219958b8316efccca53df84ed9

    SHA256

    aa96444e519f79a262a0e6e4d74eccfb6d0ee19984003614a9e17068c9c83256

    SHA512

    deccccc475fbe100c76e5b3591e278e9a30d0b5a6a3543ae28f8dbd9650f0145ee257fe2cd05fb8796dadfe6191fb635a624138cdafa7b22073ebdc65b8389db

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    81KB

    MD5

    eda78cf17375b9386488e5f98a7a85cb

    SHA1

    8b2e6539c778e841b359e3a75975cba3cdf13dfd

    SHA256

    a2f70367ea724371610915fe6bd8160ac3911f913bd2428af9a17f5eb9cc7a35

    SHA512

    916a5bf0e6421c515688a698fa7270e8ae31330854db82a517f3237509acc38b0b8f6e18dcd9a9c964fcdb6472b23bb3b5880c63df29ce3419176913e3819491

  • memory/2416-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2416-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB