Analysis

  • max time kernel
    150s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 06:00

General

  • Target

    bd2b4664fd98e21574d09f427d1b86db67d6f566c8c9098340eb660d01c35bd1N.exe

  • Size

    58KB

  • MD5

    251665e54886185bbd9bed5b643d0cd0

  • SHA1

    702043f1221c44d4a61a9d1991a4ff413fa29322

  • SHA256

    bd2b4664fd98e21574d09f427d1b86db67d6f566c8c9098340eb660d01c35bd1

  • SHA512

    215e73911580545b85629c31e46fdf6f5e7f269b570c11bb27d7109ca584d08e7f4de9cf3867bf95815fccf536cf050c8a7dc26eab5e9d90bff697f244f88803

  • SSDEEP

    768:a7BlpyqaFAK65euBT37CPKKDm7EJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9AD/:a7ZyqaFAxTWbJJZENTNyoKIKM/

Malware Config

Signatures

  • Renames multiple (1164) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd2b4664fd98e21574d09f427d1b86db67d6f566c8c9098340eb660d01c35bd1N.exe
    "C:\Users\Admin\AppData\Local\Temp\bd2b4664fd98e21574d09f427d1b86db67d6f566c8c9098340eb660d01c35bd1N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    59KB

    MD5

    2414f24e5597fb2b90a438e9e0c606d5

    SHA1

    a9a2d0a4d0ab7631d4f816d19019a28c66c1ef6b

    SHA256

    26e9ac995b4a1ba3ade0ae05f6f0424ef9090c2a491d1cdb21c26ea3e936c7ac

    SHA512

    2d3b7d413d9d9c6ed1f514da0b20b6e4fb1984a3585c3e565ad98e0af4d2155d9b0bcf99221096bd82740b99ba1bb425e9ca94b56a8b147f70b64d2a3f8777ea

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    68KB

    MD5

    0253066e687662d3c6e73a251cd51c2f

    SHA1

    9791aa837162187bd8307b4427337603d1ed1c52

    SHA256

    9e271e3429601ec43f019d3ca65e8ab697e07a7c3e252d3cdf4a67d3e56f1b63

    SHA512

    b9c172cdba941657c7044508d00c1797b25833e4ad42fcda32704db6d8cd2be30a87b7258757937be0d8d83ceb16e4e6f8f1c0d558bbc2888b5138d96aed2752

  • memory/1348-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1348-26-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB