Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:19

General

  • Target

    2897a7cf01455835417ce63f2cfcd3855de43b2f4c19b6f87bd5a932c88d3e1aN.exe

  • Size

    44KB

  • MD5

    d73f36c64bb464f822ecbd926517af80

  • SHA1

    859e3962834df3ad16caca0e0bde5030bd4cfa71

  • SHA256

    2897a7cf01455835417ce63f2cfcd3855de43b2f4c19b6f87bd5a932c88d3e1a

  • SHA512

    da0f2904a6e87e8a63864dfd6717cc1d507e08d9ba6ae1057a949339fb30a2f94bf39e045715dc5566e409122dc76a4ce81c18248e7951b0a8ed4de1b23cd360

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJPbUEobUE51lRtJicszsOVCXb9CGDb9CGea7Aa77:kBT37CPKKdJJTU3U2lRtJfO6CQCM

Malware Config

Signatures

  • Renames multiple (3177) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2897a7cf01455835417ce63f2cfcd3855de43b2f4c19b6f87bd5a932c88d3e1aN.exe
    "C:\Users\Admin\AppData\Local\Temp\2897a7cf01455835417ce63f2cfcd3855de43b2f4c19b6f87bd5a932c88d3e1aN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    3f2268dfa6eda9790e5a2df52369dfc5

    SHA1

    0d7586c3aa370d64c45601aac4b197197f18fbfe

    SHA256

    630c4a448b9bccd41bf6b1862a3c44bfd3ee7243e8ba8b676c11753a6a2dd053

    SHA512

    2e8d236ed8abd03a9ee4cc5cd0c4db9bdcb506dd16c020bd08b41837ed09313a6eeac89603abdd705966ddd327288abf8e3933c094ec6d6a66462b70a87a206b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    50abe82145937ca7737831905634181f

    SHA1

    fa5edf24fa626d72c81c5cce5642202e39d87912

    SHA256

    3bd4c29bcb8b46e815c7153f1e2fb9a72048dcefae82848c8ce0163443fb962e

    SHA512

    50963b3ad8bf827236e758a5ab9c0859f1e4ca13ddaa5dde44a1ec63170b0319eb0ebf4d743d7e7075371d2ffecab92d44ccbd0d8bea6d8520572c1ddc5605e9

  • memory/3064-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3064-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB