Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 12:59

General

  • Target

    2498d981126fe875c2d39cf238f5c90508e43f5a8f473f7e7896abe5f7dfdf86N.exe

  • Size

    72KB

  • MD5

    64104d08e9dc525532b358d96b879150

  • SHA1

    2bb1f00b68d42d403a98e3d79014f22feede70a7

  • SHA256

    2498d981126fe875c2d39cf238f5c90508e43f5a8f473f7e7896abe5f7dfdf86

  • SHA512

    881ef5c5ce41f7c4a3cf51939cbc6de4cbb71aad6be2f012b31af57d5045cf647cd665ea67ca3a6dcfe0014eb9eee3168fdb0cba783f20468b016b5d10575013

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8asUsJOLKc/xJtLJtTGVOv:KQSohsUsUKw

Malware Config

Signatures

  • Renames multiple (3313) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2498d981126fe875c2d39cf238f5c90508e43f5a8f473f7e7896abe5f7dfdf86N.exe
    "C:\Users\Admin\AppData\Local\Temp\2498d981126fe875c2d39cf238f5c90508e43f5a8f473f7e7896abe5f7dfdf86N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    a9f534e45fe27369420d54005e00b052

    SHA1

    66bb63adcfb8c074b25b1181584c537ca9f16baf

    SHA256

    585fa8c86b25dfe7b68ef1a3f8f5583f5ef14949d6c7084faa96307d615fccdc

    SHA512

    bd3f0820b73342e117488096408fed24ab4ac30da01029135df1d4840bad91269e87a57836caaabfff92942716b697e3940a9fa534c74887741e4ea13110cc41

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    81KB

    MD5

    3d32f9ff19d20bc572449b36d91afe95

    SHA1

    7d486b4d461671eb378f8615192256e45f6dcb6d

    SHA256

    57c94b1e7e6685b223d1dadd37373af59c733151506fce2fed3a3be07525c766

    SHA512

    53a6b8e4f1eaa156a21fae513ed9006c74199a05d1636ec3662e4a7d51e3c24ff31e39d103a514614e58e8ae82bea980391bb3aaafc8d20bc12d061a44c2dc0a

  • memory/2372-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2372-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB