Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 17:18

General

  • Target

    f3e31dcb8bb766a659ccdef1aad47ac1a5b79faddb247b5a7a9afcefe360e42dN.exe

  • Size

    40KB

  • MD5

    696f5bcaaf67f7f771e388c6b232ba60

  • SHA1

    11a28d294cac8e01715e898a217f942f5b3fa452

  • SHA256

    f3e31dcb8bb766a659ccdef1aad47ac1a5b79faddb247b5a7a9afcefe360e42d

  • SHA512

    f78d242ce73c22cd2cd5378c3dc562d7104af5ec6d3b6592651a5814db8ccf459058f7d492a02e648b88caa1f3d6209ff49a6047fe522e53f0f874b1d313396d

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJ59ADJsPdwEbdwERKe:CTW7JJZENTNyoKIKMPdwEbdwERKmEQKe

Malware Config

Signatures

  • Renames multiple (3460) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3e31dcb8bb766a659ccdef1aad47ac1a5b79faddb247b5a7a9afcefe360e42dN.exe
    "C:\Users\Admin\AppData\Local\Temp\f3e31dcb8bb766a659ccdef1aad47ac1a5b79faddb247b5a7a9afcefe360e42dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    da17b3d57313a9a8dcd0cd398cdb856c

    SHA1

    1ecc2f70f6cac86c86450b7f9dcf836af0b8391f

    SHA256

    55be03be8829ca3357ffb3a2bed95162e2864ef6b682cd4616e68868ffa11fff

    SHA512

    95e5356fd3b3a839a5a60d23bc8e1da8380d15231c578f4eca3652a6183801d2a37fe4d19af4a9fa83b7576a7450819618491b0279b01cff314d07d5a34e9705

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    dca37e150ada926e30a990a0588f1c9d

    SHA1

    3c7d9cd9974c2ad171cec73deb70fdc6326819b4

    SHA256

    c8fd114474d0e79fb9653cae2f15edf6356870443e8ea39453e73b103b6afa02

    SHA512

    655d7e5144b84e150ded4e35bdde14f743f9a110f727d4f77d504f6667f72847db21e74e72a27f4f91430a39e44fe1eef7ee949a0fce3146244cca4cf532d0c4

  • memory/1660-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1660-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB