Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 13:00

General

  • Target

    d73411afb9e5959aa4acbea79ee5a40ec9bd12edd281a470c372c61c5ea3a43bN.exe

  • Size

    46KB

  • MD5

    77d89889a6a13001c86805ea282d97e0

  • SHA1

    e6b81aa49f5aa9de5fee204764fd01e433751e84

  • SHA256

    d73411afb9e5959aa4acbea79ee5a40ec9bd12edd281a470c372c61c5ea3a43b

  • SHA512

    e1e2a03dd4f8131cf4356c1f8d4504015ddc829eb28c389722109d855988a78c96e8957e9fc85bdee5524a55ec0c18b0f048e97e9134073f7b9c16e0ca55e3c2

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9F:V7Zf/FAxTWoJJ7Tv

Malware Config

Signatures

  • Renames multiple (3440) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d73411afb9e5959aa4acbea79ee5a40ec9bd12edd281a470c372c61c5ea3a43bN.exe
    "C:\Users\Admin\AppData\Local\Temp\d73411afb9e5959aa4acbea79ee5a40ec9bd12edd281a470c372c61c5ea3a43bN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    a530495aa14e84ac42d542da9bb72669

    SHA1

    92db990ebc4c99c1018b38bdeb8a835d8a2b1c38

    SHA256

    4f5305586789cd4197f66435da0e5a1710b54c75d2f3cbfa877bcff1773e31ce

    SHA512

    0fe5d3270b38c8ea4436ba015bade690bc634de3731d80e2ae936e218434db32b25af6313b73c8f4f8d1b89a9197f0a60565b589e38d1765c2f0f0efa4e095b0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    e7e600d394a163491a7001a922a58ab6

    SHA1

    a263987f52b91b18c9c7b772b49919ce08b32829

    SHA256

    701ac09415a9d9b0546aac055193f2e99dad4eeb8365fd686f5f7362213c92ba

    SHA512

    b0fa8a12e7bab9cc656d084505a91828fd6806f00c741c0f91848d61cd8cb5e0a4b2f0125295022a692325f17bc8e4509ce57c4d8d983e2610f46d53c1d18e74

  • memory/2540-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2540-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB