Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:55

General

  • Target

    1d10f8959f1f44dee1db011364c357335211dd0b252c413db14c0fbdb04ac7f1N.exe

  • Size

    89KB

  • MD5

    96f4e3fbe4e09afb89f575e300c7a1c0

  • SHA1

    3e5dcebf11c5e75f79e1c264f030a23e4293ca52

  • SHA256

    1d10f8959f1f44dee1db011364c357335211dd0b252c413db14c0fbdb04ac7f1

  • SHA512

    e444935c487fa7e835b71d8c79c3901fbe36717c90f5d107b4c5da7333f9a16c50a33202638b52f8b3d7e08264f5081c3c95f115c096e03d6e0aba5880b610c8

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZ+:fnyiQSo7Z+

Malware Config

Signatures

  • Renames multiple (3498) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d10f8959f1f44dee1db011364c357335211dd0b252c413db14c0fbdb04ac7f1N.exe
    "C:\Users\Admin\AppData\Local\Temp\1d10f8959f1f44dee1db011364c357335211dd0b252c413db14c0fbdb04ac7f1N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    89KB

    MD5

    d9bd9963c9487f0b2f3223a3b02be0df

    SHA1

    49e719bf9d818fe75607d82224ef81de9aa60a99

    SHA256

    dadbd8ac8622399f79ae38a6a374cb6e06e0632f2130505a0e204211aa52d6c9

    SHA512

    7ba7a49f3f8337afe34d66ed0269b7bb9b2e205080d7cad201d0d8f589bcf43cd75ed9218cb577dcb1873c53980eedee9cbc56715ce24c1a2075a374721a73b2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    98KB

    MD5

    5f120cf003e48ad7fee2ea038b8333eb

    SHA1

    4b015da30740769b8f19ae83dad325350ba27dc1

    SHA256

    a2cc51cd7426cf6569d85289c374b8009908fc9d2177f04c706d2a003a0f7025

    SHA512

    ab2ce410b85bf5b02e5e97c4029a53e6e477838eb05a238560d01ff67f692f2c92ca625ef61d63c585328971d22b549f1911b21c36e6e3c4a1cb9e4dcb020de7

  • memory/540-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/540-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB