Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 07:00

General

  • Target

    ef5d3ce7b07c492bc8b5208de9c72d4c48b8ea70599760177132dbfe4ad7503dN.exe

  • Size

    55KB

  • MD5

    72f0f3ab0480e2968955674c099bb420

  • SHA1

    3c6ebd8d81fcd826c6a27fd582a1375a00e9413d

  • SHA256

    ef5d3ce7b07c492bc8b5208de9c72d4c48b8ea70599760177132dbfe4ad7503d

  • SHA512

    18117d1a10e8b76442b27e078a4aea556980489b0ec9b691198a844260a926e8905e2906dfe054fa7d4dad57c5dd07357b108dae65be854b1840b66fe918db60

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9Dr5TG:V7Zf/FAxTWoJJ7TVr9G

Malware Config

Signatures

  • Renames multiple (3209) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef5d3ce7b07c492bc8b5208de9c72d4c48b8ea70599760177132dbfe4ad7503dN.exe
    "C:\Users\Admin\AppData\Local\Temp\ef5d3ce7b07c492bc8b5208de9c72d4c48b8ea70599760177132dbfe4ad7503dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    4a61d52a187442f4c8e6ffccc46c2c63

    SHA1

    7fafa878433c88920fba2c8a2f080406f6f8137f

    SHA256

    6844570684466434c2daf2dcec992959554d1885416502231fa861559e85e4ce

    SHA512

    71dcbc5213ddc5c7ed738751a8a171ad8f55f242529c0c0b244423f139a001226c6a49d9ec54ec7c90c9b0e560e5a1f6e61dbcf745b59c35dea37bc05cd40475

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    59f4d434ead7063c1276bb7b184c00fd

    SHA1

    5800ce16f7cf994b4b923cba3f1229a474244109

    SHA256

    12ee78f4554c2bb06475d205d34244703464c100a8efb351c5a65c48226886f0

    SHA512

    af098d99a065e550f0add23625bbeb40db62218f5e651b5665cd0146cf0d559d826411846cff1835bdee4532fc51a035bb589169379c76964bab97e7c7e02e23

  • memory/2748-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2748-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB