Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:42

General

  • Target

    d4d3755bc1614d102fe5bc0efff7d192d5083b421950a532272c259d832aebecN.exe

  • Size

    64KB

  • MD5

    1e3c90b86f4ed03b8a0d597eb04368d0

  • SHA1

    106942e85403446bf1b451c2ba2955c549d17ea9

  • SHA256

    d4d3755bc1614d102fe5bc0efff7d192d5083b421950a532272c259d832aebec

  • SHA512

    1ffd3ba4f334e74682ab3e9c99d09a6601219a6e33705cec7cf84bf0bb44f1a4f6f699449fda429184e43cff26512ebd5d36c4a0d530eb9d91cd0ba50dff5e44

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzO:CTWn1++PJHJXA/OsIZfzc3/Q8zxY5Kw/

Malware Config

Signatures

  • Renames multiple (3158) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4d3755bc1614d102fe5bc0efff7d192d5083b421950a532272c259d832aebecN.exe
    "C:\Users\Admin\AppData\Local\Temp\d4d3755bc1614d102fe5bc0efff7d192d5083b421950a532272c259d832aebecN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    64KB

    MD5

    891f24f8f4be7cd0df81c8f7f4c88619

    SHA1

    2510f58a2584d631b5f386fca555be4d4d47c7c8

    SHA256

    6857f993ca4e7c68a2f7915e85c3eb80a0beddaa801fb8642a58a008a195a11c

    SHA512

    4b643cb8e89fa8b8eca48d70e3e2743888cf37271d5965a26fb26ae39956abc94c6f5f8983f692189a5d53811003f52635ecdc22c7e30977f019b4ba5abb0417

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    73KB

    MD5

    2485c902a2eda5f9ca8460a32a671c8f

    SHA1

    7cc63632133398119098a240f860a2566308b536

    SHA256

    1303d256f4d1cd98c68b3f22391f2f812a1ad0239f049d23b77c379c3d93c83b

    SHA512

    95f8c22ef146e8740950d434fd2caa0a476b4f2aa8539f97dba466341436e6a006a693938a61a15255e9e70f2b45e2abfeb373b08a05740193406b0307419031

  • memory/2876-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2876-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB