Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 00:06

General

  • Target

    0e3bba75188300f09427c396d1ccea5ba0db4fc261d4d5565f8d214a761bb577N.exe

  • Size

    47KB

  • MD5

    fd6581873a05f1b920b12d260d8cccf0

  • SHA1

    5f0bd293a12d7ea0855852ddb10f2ba28014720b

  • SHA256

    0e3bba75188300f09427c396d1ccea5ba0db4fc261d4d5565f8d214a761bb577

  • SHA512

    eb3fdbdca917593c97c58738692522b1504afdd25e05a0563987f49981d7d0d6f5f0ec56d3d71891308169fb66adf432e67c49142fc3d16c6ae33b335c2f7b56

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9r:V7Zf/FAxTWoJJ7Tx

Malware Config

Signatures

  • Renames multiple (3424) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e3bba75188300f09427c396d1ccea5ba0db4fc261d4d5565f8d214a761bb577N.exe
    "C:\Users\Admin\AppData\Local\Temp\0e3bba75188300f09427c396d1ccea5ba0db4fc261d4d5565f8d214a761bb577N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    3555ebedba7a5cc7ce196ad7e59245ab

    SHA1

    e769fa61fc4d1bfd0ae870f1a52456ce93b3de79

    SHA256

    2431b658f27958367b6fa85a04236ddfcb0db707c55cc489508a3ff6e149b3c0

    SHA512

    d5ed78394ea82fdad0ab96d48e338e4f43c5c410ed68e9a6be421883b2e6f01d5b723c49b4285b4360331250cc32d2f42760b7ea84947adac6d624e35c3f27b3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    6915c12ce5ca8c6dc13a3cafcf1cc482

    SHA1

    9c908d1c62f5cada984ab0db10f867f141a3c93b

    SHA256

    83400292361a5aa722d702aeb14773031e85b0e838c535864b3f10d9932d1733

    SHA512

    f782d024b0fd5698b7366047c743e3e7a925004a1e6f2c45b16284682a4001f3e010b99ca11ef5e3e9c382199bcbfbd1eeb74d6f575f6f15089415d36961476e

  • memory/2268-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2268-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB