Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 23:33

General

  • Target

    cbd27563ae03642671929fbc6d7bf3a7c86a7849a89973b3c16f2d93d7b887edN.exe

  • Size

    48KB

  • MD5

    f183198fcb18122d95c9a768e37c9ca0

  • SHA1

    819a48fbbcc8f3b4c3bd7cddcad0fb1e97cc8939

  • SHA256

    cbd27563ae03642671929fbc6d7bf3a7c86a7849a89973b3c16f2d93d7b887ed

  • SHA512

    1e67d99c5831d2bc79f9ab53c111d49d40c47012d18ddc57bdac288fbe84cea7dc84cef470bc289a7495592618d3d4ee381083d48e2735d8229ea14474b9813f

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9t:V7Zf/FAxTWoJJ7TX

Malware Config

Signatures

  • Renames multiple (3253) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbd27563ae03642671929fbc6d7bf3a7c86a7849a89973b3c16f2d93d7b887edN.exe
    "C:\Users\Admin\AppData\Local\Temp\cbd27563ae03642671929fbc6d7bf3a7c86a7849a89973b3c16f2d93d7b887edN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    f7d97b0ec5447f3f702d94d8a822472b

    SHA1

    dcca07ab015b4a88dce93453bf25b77369a9dd50

    SHA256

    ee50721dc10774ee72c48aafb2dcd1eb9ff1e4ea0987cd546480692a2ba0be99

    SHA512

    2498a66a3fa1ba420c865e2ebe19631b6028573e6063c5274ce6da06ffdc773fdbbce05c210b706957c429229449c11b845481294776b011aaae82cb20f9e261

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    429ac075c1017b39f8bcfb0401e2f05f

    SHA1

    03966cf93956da3e0c8b27cb08d986add81a2c56

    SHA256

    e01c73f574807fab88ee191a271e46a9bcda0b67fd1d5d9f48c556eb34715a0d

    SHA512

    38ad9af8a45805de199279e6c61a098ee2667ffd6d7a3bdda5cb55ba23487c85ae3314ce4673012b1916ebabed7d98f61200d19a9777fb67c7241036b2e3b1ec

  • memory/2500-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2500-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB