Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 23:37

General

  • Target

    0f517709a2107cb13bb7c29dcb8413562e27312b035904c4ad81e43620ef39f2N.exe

  • Size

    32KB

  • MD5

    cb21ef866d1ec181bfea4d0a37105a20

  • SHA1

    c9d5d9fa9a007bbfe29ad793faf37db5af1401a5

  • SHA256

    0f517709a2107cb13bb7c29dcb8413562e27312b035904c4ad81e43620ef39f2

  • SHA512

    99e333a0e32537b7ad63f34c69c97b6f468c6d21907c10bc8a160c1b3fcf173571075b154354d1a27d5555db9498dd75b7d1fa93f0ef9e5af36468b96b5759e6

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI97LjLNLjLqOdfP6ttk:CTW7JJ7T1vJv2OhP6ttk

Malware Config

Signatures

  • Renames multiple (3334) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f517709a2107cb13bb7c29dcb8413562e27312b035904c4ad81e43620ef39f2N.exe
    "C:\Users\Admin\AppData\Local\Temp\0f517709a2107cb13bb7c29dcb8413562e27312b035904c4ad81e43620ef39f2N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    32KB

    MD5

    feabfbf95464f5ca2245e4af094b439e

    SHA1

    53274e436bb9871ff43cdeaf62f3f84751a4c1fc

    SHA256

    b8229f8ef230e7167b3314157d4bb5094428849e9456b78a2f315f44df24819b

    SHA512

    39c6ae0988e14ddbaf4e52dc73e7c3b94244bdf865122e107a7c7aea2be59c582ca16c3ec25571c001365aa708ede643e5bf37ec898c3bdab2cd5202c5106709

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    41KB

    MD5

    59dce102503109e9a66e06a598dd8f80

    SHA1

    28840aa554d0c239c2c754b98e8e47655b21c1a6

    SHA256

    8e783f69b237c052e0087ff929afe653c7df94e072a3b16277fed45981dde589

    SHA512

    c25d98dbff2307e0a46fcc859a286e5c579df3e4eea3ed79c705c19277abfee7e9bebbab38084ca1212031b200850d979c4b715683b7cd9fc4f474e84c19ee00

  • memory/2824-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2824-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB