Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 18:59

General

  • Target

    b153e11c87374a855052729167ada1c2f128aa74c7498b9143b17a12c059af26N.exe

  • Size

    60KB

  • MD5

    a99475cfc534b0a3a8407d929be94a00

  • SHA1

    2968c07ce529ebe195dae21d381dfdba6bb5eef7

  • SHA256

    b153e11c87374a855052729167ada1c2f128aa74c7498b9143b17a12c059af26

  • SHA512

    8bcba53622ece2af910f9025bb9f87ef0b386ad3ab0498235bfbb5977038b218f7f3bce250aae5a964d675d897c23a99450b47542aefac7dd21a2b826a690c7d

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rU:V7Zf/FAxTWbiG1i

Malware Config

Signatures

  • Renames multiple (3170) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b153e11c87374a855052729167ada1c2f128aa74c7498b9143b17a12c059af26N.exe
    "C:\Users\Admin\AppData\Local\Temp\b153e11c87374a855052729167ada1c2f128aa74c7498b9143b17a12c059af26N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    a7a5134a22a2f4cdd63eae96236d3d51

    SHA1

    3895f7cdd54192818f97bfabef2ac081977042e4

    SHA256

    9a5eff731e0aedf1e59e8c73d244a55566a61701443fcd9ec019e7d04b135b74

    SHA512

    e567478222ce39f1127cb5399764836e06847a4ebae5d466d6866088b1e4452f2f7fe0e5317cd6646ac02a3d3b3044259228ef61cc2ebbfa8f8d9ee9ecf4ce4a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    69KB

    MD5

    ed7c786712d6ab49ff4a58e0fab345a7

    SHA1

    78048876f6fc7f018e34ca7526286eb7ea7bfad7

    SHA256

    e348c6754dc3be58e9fd384f1264539112d1a081aa43275f1a5a26abe3d3ed64

    SHA512

    e9c6ff30140ab20291f4abebf94ac98496dbe5331f83e870d9e62e2a7d397633565b96b13cb381c46072b5647597c3ae64b8b888cef83fe5f12656c37c98f776

  • memory/328-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/328-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB