Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 05:11

General

  • Target

    14ae646ed5042387960c97f3d5315b7105fe8b845774decefd451d4ac1da1b7fN.exe

  • Size

    51KB

  • MD5

    64bd22bab550990934a1337c2f63ce40

  • SHA1

    7820e5aa50755b624b176c64309091018e677b39

  • SHA256

    14ae646ed5042387960c97f3d5315b7105fe8b845774decefd451d4ac1da1b7f

  • SHA512

    51bee7c999a89b89087f9f036d45ea0b90b064a05b6c6fb89274c245589f0953fd36ea2fed332174190adb0e14eefd0bfa4672fa65e77b75ccc1d56874f8c5a6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9AiOiOkjk+XUXN:V7Zf/FAxTWoJJ7TSkjkf

Malware Config

Signatures

  • Renames multiple (3308) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\14ae646ed5042387960c97f3d5315b7105fe8b845774decefd451d4ac1da1b7fN.exe
    "C:\Users\Admin\AppData\Local\Temp\14ae646ed5042387960c97f3d5315b7105fe8b845774decefd451d4ac1da1b7fN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    8448f20fbb6ede96c0e887ed4cadc805

    SHA1

    5243dcbcbc90db469a0427a770103a77f55e7f29

    SHA256

    05918c19d151b80e0eaf4da2777d3f36fb385e7034b1f59238a61452056cfb2b

    SHA512

    e9befe1a0c72353823023be104c3fec41560bad9b063ad0023a1a5a2d2546e3bc35ba9e4413bde978a143bb11b42f969ff74062a7123c3f657edac7445feec4f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    95ec31c527ef9ed960564006c4fe9868

    SHA1

    3fefc73a92591cd5bf623235ab82be20c9ae941b

    SHA256

    a9dc5f64b7ffa268aef7d63bd9604be7f842968fb48b61e91823a65d0e88c1ac

    SHA512

    65897930090cf99999238b2d2a2ed4a5e5e92ed97f48a4c2a86f2705d260de5c6354e14c00e8366e19d85369bbc87229d12df377a99df3c16c54e6121e2ea5b4

  • memory/2364-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2364-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB