Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 15:28

General

  • Target

    03288aee6954899e975e665ef194712b864bc8d8fed42c5c1400bc7f8b250106N.exe

  • Size

    29KB

  • MD5

    60b2751e4ba719bb1895818aa65ca490

  • SHA1

    edc132aba9d5cecc9d44ed64787721ce6689d750

  • SHA256

    03288aee6954899e975e665ef194712b864bc8d8fed42c5c1400bc7f8b250106

  • SHA512

    7c59d9d12c5bca225cab7667eaa031f038a6ebfe09711fe7cc11206849e5d93e4ab9b580d81db791007bfd0af125342e63a45b07481d8af933f914ff3b80b205

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9enq0vg:kBT37CPKKdJJ1EXBwzEXBwdcMcI9enct

Malware Config

Signatures

  • Renames multiple (3316) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\03288aee6954899e975e665ef194712b864bc8d8fed42c5c1400bc7f8b250106N.exe
    "C:\Users\Admin\AppData\Local\Temp\03288aee6954899e975e665ef194712b864bc8d8fed42c5c1400bc7f8b250106N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    29KB

    MD5

    d4f60988c6777e6f2d8a4f32f2f98790

    SHA1

    97dd2386b38d44a2fcf2d4633f1c0e6408e3af84

    SHA256

    73c215c08e64fc0174048339eb0cdc92eb3690da3077a54aa368877ea408e95b

    SHA512

    24b1815764a67e23a649747fef57c67a1bf4c6bba67e842c8e0e615cad485e9fc9cab636331e5f1dfec998180384df72f6bc432b947d97c649a1d7b9bb70ad89

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    38KB

    MD5

    e135f687e66d21738e388e4afc6017f7

    SHA1

    2b9398fe6b7cd7f29d205e2bbaa00acb5b17e64a

    SHA256

    d0fb5e8c6860c8b6da18dfab34d4f8121de5a9ab6fd088a6ec36d8faf0c48875

    SHA512

    c35705e0d8b032fa5ab6dce8a2bf25f404c0ee5b6870ea4f83017121dab96badc1e69ee40aa45694ead3985a44a65e6cb4b4012fdf7e81f23ef820e292a7b4d8

  • memory/2364-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2364-71-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB