Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 21:51

General

  • Target

    1748f910d8819a10c92ed07749eb017946583b7cb71f032bb17576ee57baff9cN.exe

  • Size

    74KB

  • MD5

    42b14668646dfeebd9ad672479ff82b0

  • SHA1

    3004d1e9635c2573d38caf094de03b369ddf2d60

  • SHA256

    1748f910d8819a10c92ed07749eb017946583b7cb71f032bb17576ee57baff9c

  • SHA512

    37fcb3793b973b39e70b293ab0399a668768048716970954628475f187bc10fa449ea71cf40f73474606c47d83775c6bfa7a2172be0fe1034b1e7b98f968b962

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rt:V7Zf/FAxTWtnMdyGdy4AnAJYq8YqiXq

Malware Config

Signatures

  • Renames multiple (3627) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1748f910d8819a10c92ed07749eb017946583b7cb71f032bb17576ee57baff9cN.exe
    "C:\Users\Admin\AppData\Local\Temp\1748f910d8819a10c92ed07749eb017946583b7cb71f032bb17576ee57baff9cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2864

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

          Filesize

          74KB

          MD5

          306f1638f78b9731f9436b4141d12e3f

          SHA1

          d8fbf7dc58dc5de81218155f2441246fd5f196ab

          SHA256

          285f3d1bece58251e7e5e0e2d6865b3030809a9b6ea687d253414ee640059624

          SHA512

          b15fe78ca95e05e593f5529da0de2be8d573dd571cfdbb0d5b757b7f99f241518bb5b61197b3362b3ea7d5d964938139736d7a20cba8845af08d44495d4fb616

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          83KB

          MD5

          ae1ca480d5ad14323a7eaadf1a854c99

          SHA1

          c0f299ac1fc5f881a1dcc8b36d9f72ae0709666e

          SHA256

          db26f11f97e36fad016d96d02d8332057a761a95b0699adcf7f4452da5931c1e

          SHA512

          d1a7f8b03983b966893ba468e2d639e35651edc57d5dc9a51814f6ea8ad14e3c98f664a0e3df2514d501af307469e9be1e5e521300a6b51e04a7f54ea5f4065f

        • memory/2864-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2864-74-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB