Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:44

General

  • Target

    4947327436dca96bfd56fc4b7d258d319ed5c1dabdc000875c8b06b1638be68cN.exe

  • Size

    141KB

  • MD5

    c9ec3a35e50bab71e4b1a66312f4c560

  • SHA1

    525c49bb63dd97bca819d4af48c001163679115b

  • SHA256

    4947327436dca96bfd56fc4b7d258d319ed5c1dabdc000875c8b06b1638be68c

  • SHA512

    df9b8c8405b2a0e96bd9ec736a902a3f6f97625df570d150d350460a63f00af58268c3e12f7969fcc74eb68e3998611c0db1133bb9ccf8711ab3af747b0376c5

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZTrQOv/i+vrA+SCm7x1wzz:fnyiQSo7Z7ni+9m7x1wzz

Malware Config

Signatures

  • Renames multiple (2846) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4947327436dca96bfd56fc4b7d258d319ed5c1dabdc000875c8b06b1638be68cN.exe
    "C:\Users\Admin\AppData\Local\Temp\4947327436dca96bfd56fc4b7d258d319ed5c1dabdc000875c8b06b1638be68cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    141KB

    MD5

    3769df2984ed65b154f51047638115c4

    SHA1

    d2c05200b515135225587775859872e79a39e79c

    SHA256

    9257423f99d82cb079de3a5203e7c86e0bb39185017ca09c5abc7c607adc7b8d

    SHA512

    569c635bc8bafe63adc7bb9b94830c5828fe5edc7bb9a087f2a0a4fee773720cbc222ab1149cbcc4571f72a65e913f17a4f7848512d184b200c2390bcf1b7dc3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    150KB

    MD5

    8c54b372e4c7c001caaa1b278ca1682a

    SHA1

    4a502cb274f3266a9a984ecabbe74253928f78ff

    SHA256

    e721822a32b73ac08cbe0eab721c9cff52126bca45e6d38d1be659052b1aefba

    SHA512

    8d272cae679c6148d6bea9b15b3c873834a7619bb297792dbd0d1683dd628f316513772e067d64a66173e6840901cb5124034e0e3094f5a168b7e90119372f1c

  • memory/2548-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2548-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB